#infosec

See tagged statuses in the local BookWyrm community

Remember yesterday when I told y’all some of the redactions were easy to remove? The Guardian has words.

People examining documents released by the Department of Justice in the Jeffrey Epstein case discovered that some of the file redaction can be undone with Photoshop techniques, or by simply highlighting text to paste into a word processing file.

Y’all, they used Acrobat. Because the fired all the people who normally sanitize data, and told 1200 agents not trained in infosec to hide anything that might embarrass the , and this is the result.

Have fun y’all, let’s see who we can embarrass.

https://www.theguardian.com/us-news/2025/dec/23/epstein-unredacted-files-social-media

🔐 Master Microsoft Intune Suite with confidence

Mastering Endpoint Management using Microsoft Intune Suite by Saurabh Sarkar and Rahul Singh is a hands-on guide to Intune’s premium features. Learn real-world implementation of Cloud PKI, EPM, EAM, Advanced Analytics, Remote Help, and Microsoft Tunnel with practical architecture insights and troubleshooting tips.

💸 15% OFF on Amazon.com

👉 Buy here: https://packt.link/X7oV7

This Gmail hack is unsettling not because it’s flashy, but because it’s bureaucratic. Attackers aren’t breaking encryption or outsmarting algorithms. They’re filling out forms. By changing an account’s age and abusing Google’s Family Link feature, they can quietly reclassify an adult user as a “child” and assume parental control. At that point, the rightful owner isn’t hacked so much as administratively erased.

The clever part is that everything happens inside legitimate features. Passwords are changed. Two-factor settings are altered. Recovery options are overwritten. And when the user tries to get back in, Google’s automated systems see a supervised child account and do exactly what they were designed to do: say no.

Google says it’s looking into the issue, which suggests this wasn’t how the system was supposed to work. But it’s a reminder of an old lesson. Security failures often happen when protective mechanisms are combined in ways …

I feel like the most common attack vector for bad actors is not some crazy 0-day but attacking trust. And right now we’re trusting both AI answers and the traffic around those answers. That trust boundary feels softer every month as more and more people adopt AI into their lives.

“Keystroke data from the laptop of a worker who was supposed to be in US should have taken tens of milliseconds to reach Amazon’s Seattle headquarters. Instead, the flow from this machine was more than 110 milliseconds, Amazon’s Chief Security Officer Stephen Schmidt told me.

The barely perceptible lag suggested the worker was half a world away.”

“Amazon Caught North Korean IT Worker By Tracing Keystroke Data”

https://www.bloomberg.com/news/newsletters/2025-12-17/amazon-caught-north-korean-it-worker-by-tracing-keystroke-data

Unpaywalled: https://archive.ph/20251219014819/https://www.bloomberg.com/news/newsletters/2025-12-17/amazon-caught-north-korean-it-worker-by-tracing-keystroke-data

Il reverse engineering consiste nell’analizzare software, hardware o protocolli per capirne il funzionamento interno, individuare minacce e costruire difese più solide.

Ecco una lista di strumenti per analisi malware e reverse engineering 😎👇

Trovi tutte le infografiche dedicate alla sicurezza informatica e molto altro sulla sicurezza su @sicurezza@diggita.com