Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Hey, security vendors.. this is a bullshit anti-pattern.

Hey, security vendors.. this is a bullshit anti-pattern.

Scheduled Pinned Locked Moved Uncategorized
securitycybersecurityzerodaythreatintel
8 Posts 6 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • tomsellers@infosec.exchangeT This user is from outside of this forum
    tomsellers@infosec.exchangeT This user is from outside of this forum
    tomsellers@infosec.exchange
    wrote last edited by
    #1

    Hey, security vendors.. this is a bullshit anti-pattern. This vendor and others like it intentionally leave out the impacted vendor, products, technologies, and environments. There is zero context here. Readers would need to follow the link or independently research the CVE to see if they care.

    Security practitioners see it for what it is: Fear based traffic farming.

    It isn't a good look and many of us will never trust anything you say or send you traffic.

    A note, I do work for a security vendor. We don't do this and I would absolutely call out our (awesome) marketing or research teams if we did.

    #Security #cybersecurity #zeroday #threatintel

    cr0w@infosec.exchangeC disorderlyf@todon.euD apth@infosec.exchangeA 3 Replies Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • tomsellers@infosec.exchangeT tomsellers@infosec.exchange

      Hey, security vendors.. this is a bullshit anti-pattern. This vendor and others like it intentionally leave out the impacted vendor, products, technologies, and environments. There is zero context here. Readers would need to follow the link or independently research the CVE to see if they care.

      Security practitioners see it for what it is: Fear based traffic farming.

      It isn't a good look and many of us will never trust anything you say or send you traffic.

      A note, I do work for a security vendor. We don't do this and I would absolutely call out our (awesome) marketing or research teams if we did.

      #Security #cybersecurity #zeroday #threatintel

      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchange
      wrote last edited by
      #2

      @TomSellers Yep. That account was an immediate block as soon as I saw it.

      badsamurai@infosec.exchangeB aprazeth@mstdn.socialA 2 Replies Last reply
      0
      • cr0w@infosec.exchangeC cr0w@infosec.exchange

        @TomSellers Yep. That account was an immediate block as soon as I saw it.

        badsamurai@infosec.exchangeB This user is from outside of this forum
        badsamurai@infosec.exchangeB This user is from outside of this forum
        badsamurai@infosec.exchange
        wrote last edited by
        #3

        @cR0w @TomSellers

        bro what if we market our security company like a threat actor and phish prospects!

        check your email gateways too. These kinds of vendors tend to spam your executive chains.

        Act like a TA, be treated in kind.

        1 Reply Last reply
        1
        0
        • cr0w@infosec.exchangeC cr0w@infosec.exchange

          @TomSellers Yep. That account was an immediate block as soon as I saw it.

          aprazeth@mstdn.socialA This user is from outside of this forum
          aprazeth@mstdn.socialA This user is from outside of this forum
          aprazeth@mstdn.social
          wrote last edited by
          #4

          @cR0w @TomSellers

          Accounts - plural. Also on the main mastodon instance, posting the same stuff.

          Just in case you wanted to be extra thorough

          cr0w@infosec.exchangeC 1 Reply Last reply
          0
          • aprazeth@mstdn.socialA aprazeth@mstdn.social

            @cR0w @TomSellers

            Accounts - plural. Also on the main mastodon instance, posting the same stuff.

            Just in case you wanted to be extra thorough

            cr0w@infosec.exchangeC This user is from outside of this forum
            cr0w@infosec.exchangeC This user is from outside of this forum
            cr0w@infosec.exchange
            wrote last edited by
            #5

            @Aprazeth @TomSellers Whack-a-mole. Blockity block block.

            aprazeth@mstdn.socialA 1 Reply Last reply
            0
            • cr0w@infosec.exchangeC cr0w@infosec.exchange

              @Aprazeth @TomSellers Whack-a-mole. Blockity block block.

              aprazeth@mstdn.socialA This user is from outside of this forum
              aprazeth@mstdn.socialA This user is from outside of this forum
              aprazeth@mstdn.social
              wrote last edited by
              #6

              @cR0w @TomSellers

              Also, I appreciate the heads up on the account(s).

              I get the need to hustle and bustle but not by stooping to this point of buzzfeed. Yeesh

              1 Reply Last reply
              0
              • tomsellers@infosec.exchangeT tomsellers@infosec.exchange

                Hey, security vendors.. this is a bullshit anti-pattern. This vendor and others like it intentionally leave out the impacted vendor, products, technologies, and environments. There is zero context here. Readers would need to follow the link or independently research the CVE to see if they care.

                Security practitioners see it for what it is: Fear based traffic farming.

                It isn't a good look and many of us will never trust anything you say or send you traffic.

                A note, I do work for a security vendor. We don't do this and I would absolutely call out our (awesome) marketing or research teams if we did.

                #Security #cybersecurity #zeroday #threatintel

                disorderlyf@todon.euD This user is from outside of this forum
                disorderlyf@todon.euD This user is from outside of this forum
                disorderlyf@todon.eu
                wrote last edited by
                #7

                @TomSellers

                Link Preview Image
                NVD - CVE-2026-27941

                favicon

                (nvd.nist.gov)

                There, did their job for them. I prefer to be paid in euros

                1 Reply Last reply
                0
                • tomsellers@infosec.exchangeT tomsellers@infosec.exchange

                  Hey, security vendors.. this is a bullshit anti-pattern. This vendor and others like it intentionally leave out the impacted vendor, products, technologies, and environments. There is zero context here. Readers would need to follow the link or independently research the CVE to see if they care.

                  Security practitioners see it for what it is: Fear based traffic farming.

                  It isn't a good look and many of us will never trust anything you say or send you traffic.

                  A note, I do work for a security vendor. We don't do this and I would absolutely call out our (awesome) marketing or research teams if we did.

                  #Security #cybersecurity #zeroday #threatintel

                  apth@infosec.exchangeA This user is from outside of this forum
                  apth@infosec.exchangeA This user is from outside of this forum
                  apth@infosec.exchange
                  wrote last edited by
                  #8

                  @TomSellers I've seen it from a couple of accounts now and they both started with "affects multiple systems", I assumed it was a bot

                  1 Reply Last reply
                  1
                  0
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups