This is not Simon. Username was changed just in case. Opinions are made by a screaming goat and do not express the views or opinions of his goatherder.
Public Key
npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln
Profile Code
nprofile1qqsvv453z32q9ecllj2rsc46manrqtj8kdl49p2yr3kvckfvcy2yprgpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dsspacal
Author Public Key
npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Show more details
Published at
2024-04-23T14:13:50+02:00 Event JSON
{
"id": "3d1643dbc967c1906851251e3bf5025ed5abf751beee61106be5708213176395" ,
"pubkey": "c65691145402e71ffc943862badf66302e47b37f5285441c6ccc592cc114408d" ,
"created_at": 1713874430 ,
"kind": 0 ,
"tags": [
[
"proxy",
"https://infosec.exchange/users/screaminggoat",
"activitypub"
]
],
"content": "{\"name\":\"Not Simon the Goat\",\"about\":\"This is not Simon. Username was changed just in case. Opinions are made by a screaming goat and do not express the views or opinions of his goatherder.\",\"picture\":\"https://media.infosec.exchange/infosec.exchange/accounts/avatars/110/730/368/199/044/452/original/131dc18415c27ad1.png\",\"banner\":\"https://media.infosec.exchange/infosec.exchange/accounts/headers/110/730/368/199/044/452/original/bacc42f87a932ee5.png\",\"nip05\":\"[email protected] \"}" ,
"sig": "65efe410ed8a358f8b25b969af620c448deeeebe0a32d25c504e3552a84ba0dc36b5a5bb1b4ffad1e930c34e7b2155c837e3c2a72c31134866991c83ea257e65"
}
Last Notes npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub1zj4…fyjh paywall on the intelligenceonline.com article. Do you have a list of what Chengdu 404 is hiring for? npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat Does Mitel understand what a security vulnerability is? None of their 17 July 2024 advisories contain a CVE ID. Replace your Mitel IP phones with Cisco. npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub12lx…jvjy nooo my timely and actionable goat information! npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub18c7…er9d build up your caffeine tolerance little by little until you're mainlining espresso shots directly into your veins. Otherwise you can delegate where possible. and leave the cyber to me 🐐 npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat Tenable: Fortra FileCatalyst Workflow Unauthenticated SQLi Tenable decided to drop a same-day proof of concept for Fortra FileCatalyst Workflow SQL injection vulnerability CVE-2024-5276 (9.8 critical, disclosed 25 June 2024, see Fortra security advisory). See Bleeping Computer reporting: Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released #CVE_2024_5276 #Fortra #vulnerability #CVE #ProofofConcept #POC npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub17lg…9uux Genians (Korean company) first reported Kimsuky APT using the MSC attack vector on 05 June 2024: https://www.genians.co.kr/blog/threat_intelligence/facebook (Korean language) npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub1vcl…k6t3 https://media.infosec.exchange/infosec.exchange/media_attachments/files/112/641/433/413/706/304/original/eaabe600c9078018.mp4 npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub1vcl…k6t3 I can source you the RSS for most of the listed ones, dunno who maintains the feeds. Unfortunately I'm hotspotting my phone so it's a little difficult for me right now. npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub1vcl…k6t3 I've got slow internet atm but your TTI Intel Feed looks great. Do you have Broadcom's VMware security advisories in there? npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat SANS ISC: Brute Force Attacks Against Watchguard VPN Endpoints @npub1xk3…vxw8 of SANS ISC identified 185.122.204[.]102 attempting to brute force a Watchguard firewall VPN. Curiously only using two usernames: jason and robert. #IOC #threatintel npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat In case any Chinese threat actors are monitoring my Mastodon, it's already June 4th and the 35th anniversary of the Tiananmen Square Massacre: https://en.wikipedia.org/wiki/1989_Tiananmen_Square_protests_and_massacre #tiananmensquare #china #tiananmen npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub1vcl…k6t3 FBI’s Encrypted Phone Platform Infiltrated Hundreds of Criminal Syndicates; Result is Massive Worldwide Takedown npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub1zj4…fyjh https://media.infosec.exchange/infosec.exchange/media_attachments/files/112/487/458/393/759/318/original/68100fb245a61ade.png npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub1zj4…fyjh Great job finding all of the government links on APT28. I only just discovered the European Council and NATO statements this morning and was going to share them with you. npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat Fortinet: Proactive Responsible Disclosure is One Crucial Way Fortinet Strengthens Customer Security Fortinet emphasizes the need for other tech companies to provide transparency and responsible disclosure of vulnerabilities. While this blog post is about Fortinet's own commitments to being a role model in ethical and responsible product development and vulnerability disclosure, it actually reads like a dig at other companies (like JetBrains) #vulnerability #vulnerabilitydisclosure npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat ESET: Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals If you know Python, you already know why. The TL;DR is: Ease of use and conciseness Versatility Adaptability and integration Task automation Extensive libraries and active community #Python #cybersecurity npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat Sysdig: Meet the Research behind our Threat Research Team – RSA 2024 I thought the title was a typo but Sysdig showcases various threats and vulnerabilities that their threat research team worked on: such as SSH-Snake, Romanian threat actor RUBYCARP, Operation SCARLETEEL, cryptojacking Operation AMBERSQUID, Meson Network, Operation LABRAT, CVE-2024-3094 (XZ Utils), and the Leaky Vessels vulnerabilities. You can meet the threat research team at booth S-742 at RSA Conference 2024, May 6 – 9 in San Francisco. npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat Changing my username on Monday had an unintended consequence: 600 followers were removed today! I don't remember every single* person who used to follow me, but baby come back! Any kind of fool could see 🎵 npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat @npub1vcl…k6t3 How do you know that this is a Chinese APT? I searched for the keywords "China" "Chinese" and even "Asia", then scanned the blog post line by line and I don't see any explicit reference to China. npub1cetfz9z5qtn3lly58p3t4hmxxqhy0vml22z5g8rve3vjesg5gzxs6mclln Not Simon the Goat FYSA: My username was changed to @npub157z…2q4w. Please update your RSS feed. EDIT: I will continue to provide high quality photos and facts about goats. https://media.infosec.exchange/infosec.exchange/media_attachments/files/112/317/902/020/738/180/original/9e36a1d785470f54.mp4