Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Listening to cybersecurity people freak out over Mythos is so tiring.

Listening to cybersecurity people freak out over Mythos is so tiring.

Scheduled Pinned Locked Moved Uncategorized
45 Posts 35 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

    Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

    cyberoutsider@infosec.exchangeC This user is from outside of this forum
    cyberoutsider@infosec.exchangeC This user is from outside of this forum
    cyberoutsider@infosec.exchange
    wrote last edited by
    #6

    @malwaretech I liked the days when we were panicking about China listening in on all our telephone calls / scooping up our mobile data.

    Now we just talk directly to some American company's AI and ask them to diagnose our medical problems that we're too embarrassed to see a real doctor for.

    1 Reply Last reply
    0
    • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

      Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

      gsuberland@chaos.socialG This user is from outside of this forum
      gsuberland@chaos.socialG This user is from outside of this forum
      gsuberland@chaos.social
      wrote last edited by
      #7

      @malwaretech now now, don't be raggin' on my local water treatment plant, they're much more up to date than that. they run Windows Vista.

      gsuberland@chaos.socialG 1 Reply Last reply
      0
      • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

        Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

        ozu@infosec.exchangeO This user is from outside of this forum
        ozu@infosec.exchangeO This user is from outside of this forum
        ozu@infosec.exchange
        wrote last edited by
        #8

        @malwaretech I truly don't understand it. CISOs and managers are jizzing themselves from snake oil is not new but form technical people I'd expect more.

        1 Reply Last reply
        0
        • gsuberland@chaos.socialG gsuberland@chaos.social

          @malwaretech now now, don't be raggin' on my local water treatment plant, they're much more up to date than that. they run Windows Vista.

          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.social
          wrote last edited by
          #9

          @malwaretech (don't ask about the Windows NT4 machine in the PLC cabinet. nobody knows what it does but we're all too scared to turn it off in case the 5GB Maxtor hard drive in there dies during spinup)

          floe@hci.socialF 1 Reply Last reply
          0
          • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

            Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

            nav@mstdn.socialN This user is from outside of this forum
            nav@mstdn.socialN This user is from outside of this forum
            nav@mstdn.social
            wrote last edited by
            #10

            @malwaretech I think you underestimate how ancient some of us are. I'm definitely older than anything my mobile provider owns, cos I'm older than the industry.

            darwinwoodka@mastodon.socialD 1 Reply Last reply
            0
            • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

              Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

              F This user is from outside of this forum
              F This user is from outside of this forum
              fl0und3r@defcon.social
              wrote last edited by
              #11

              @malwaretech my rule of thumb is AI is applied to those things that the powers that be don't actually give a shit about, and have only pretended to up until this point.
              If the powers that be actually gave a shit about security models wouldn't have any low hanging fruit to exploit for the headlines

              1 Reply Last reply
              0
              • gsuberland@chaos.socialG gsuberland@chaos.social

                @malwaretech (don't ask about the Windows NT4 machine in the PLC cabinet. nobody knows what it does but we're all too scared to turn it off in case the 5GB Maxtor hard drive in there dies during spinup)

                floe@hci.socialF This user is from outside of this forum
                floe@hci.socialF This user is from outside of this forum
                floe@hci.social
                wrote last edited by
                #12

                @gsuberland @malwaretech it's scary 'cause it's true 🫣

                gsuberland@chaos.socialG 1 Reply Last reply
                0
                • floe@hci.socialF floe@hci.social

                  @gsuberland @malwaretech it's scary 'cause it's true 🫣

                  gsuberland@chaos.socialG This user is from outside of this forum
                  gsuberland@chaos.socialG This user is from outside of this forum
                  gsuberland@chaos.social
                  wrote last edited by
                  #13

                  @floe @malwaretech it's based on real events 😄

                  gsuberland@chaos.socialG 1 Reply Last reply
                  0
                  • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                    Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                    lemgandi@mastodon.socialL This user is from outside of this forum
                    lemgandi@mastodon.socialL This user is from outside of this forum
                    lemgandi@mastodon.social
                    wrote last edited by
                    #14

                    @malwaretech

                    "Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit card information from someone living in a cardboard box to someone living on a park bench"

                    (Gene Spafford)

                    1 Reply Last reply
                    0
                    • gsuberland@chaos.socialG gsuberland@chaos.social

                      @floe @malwaretech it's based on real events 😄

                      gsuberland@chaos.socialG This user is from outside of this forum
                      gsuberland@chaos.socialG This user is from outside of this forum
                      gsuberland@chaos.social
                      wrote last edited by
                      #15

                      @floe @malwaretech you know it's great when you walk into the place and someone immediately hands you a piece of paper with both the IP address and MAC address of this thing and says "do not send ANYTHING to this machine, we are terrified of breaking it"

                      erikbussink@vmst.ioE 1 Reply Last reply
                      0
                      • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                        Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                        N This user is from outside of this forum
                        N This user is from outside of this forum
                        nanianmichaels@tech.lgbt
                        wrote last edited by
                        #16

                        @malwaretech My current workplace has Windows 9x machines still in active use. And they're on a network with Internet access. Same with the XP ones. And by the looks of it, there will be HUNDREDS of W10 machines that will be in use well after October this year (in the EU, so we're still covered).

                        1 Reply Last reply
                        0
                        • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                          Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                          reiddragon@fedi.catto.gardenR This user is from outside of this forum
                          reiddragon@fedi.catto.gardenR This user is from outside of this forum
                          reiddragon@fedi.catto.garden
                          wrote last edited by
                          #17
                          @malwaretech can we also talk about how card payments are basically handing your wallet to the store and trusting them to only take what they're owed?
                          1 Reply Last reply
                          0
                          • eliasp@mastodon.socialE eliasp@mastodon.social

                            @sancla but instead of investing in the maintainers of OpenSource projects, so they can work on security, instead of focusing on building more resilient infrastructure, the capital made available to improve security will be put into deploying AI-driven endpoint security and DLP tools and to hire "security experts" whose sole skill is tokenmaxxing and role-playing as cyberdefense-pro!

                            @malwaretech

                            sancla@infosec.exchangeS This user is from outside of this forum
                            sancla@infosec.exchangeS This user is from outside of this forum
                            sancla@infosec.exchange
                            wrote last edited by
                            #18

                            @eliasp @malwaretech
                            Most like yes, but either way focus is getting stronger on supply chains.

                            Hopefully, it’ll get companies depending on open source scratching their heads abut this and get them more involved into open source.

                            Then again, corporate involvement may not always be the best influence for open source, time will tell and fingers crossed…

                            markush@chaos.socialM 1 Reply Last reply
                            0
                            • sancla@infosec.exchangeS sancla@infosec.exchange

                              @malwaretech I don’t care, if this puts security back on the agenda, I’ll take it…

                              misusecase@twit.socialM This user is from outside of this forum
                              misusecase@twit.socialM This user is from outside of this forum
                              misusecase@twit.social
                              wrote last edited by
                              #19

                              @sancla @malwaretech This is like the dozen or so times before it when dudes in the C-suite have gone all-in on some hype technology, product, or cyberattack instead of doing basic things like vulnerability and patch management. This kind of “agenda” we don’t need.

                              1 Reply Last reply
                              0
                              • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                                Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                                guigsy@mstdn.socialG This user is from outside of this forum
                                guigsy@mstdn.socialG This user is from outside of this forum
                                guigsy@mstdn.social
                                wrote last edited by
                                #20

                                @malwaretech I work in a large company that was hacked last year. Many modern systems were compromised. The RS6000 box and several of our ancient mainframes were untouched and weren't even turned off during the lockdown or recovery. Gave them a quick once over and they kept ticking like it was 1999.

                                1 Reply Last reply
                                0
                                • gsuberland@chaos.socialG gsuberland@chaos.social

                                  @floe @malwaretech you know it's great when you walk into the place and someone immediately hands you a piece of paper with both the IP address and MAC address of this thing and says "do not send ANYTHING to this machine, we are terrified of breaking it"

                                  erikbussink@vmst.ioE This user is from outside of this forum
                                  erikbussink@vmst.ioE This user is from outside of this forum
                                  erikbussink@vmst.io
                                  wrote last edited by
                                  #21

                                  @gsuberland @floe @malwaretech And two days later the hired tiger team launched a full vulnerability scan against it … because … tiger team manager did not communicate. Banking system down for a few days…

                                  iamdannyboling@mstdn.socialI 1 Reply Last reply
                                  0
                                  • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                                    Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                                    mossyfoot@pdx.socialM This user is from outside of this forum
                                    mossyfoot@pdx.socialM This user is from outside of this forum
                                    mossyfoot@pdx.social
                                    wrote last edited by
                                    #22

                                    @malwaretech until recently, all ATMs ran a crazy version of Windows XP and now they run a crazy "IoT" version of Windows 11. Instead, of, say, something like SELinux. Something halfway sane.

                                    cesarb@mastodon.socialC 1 Reply Last reply
                                    0
                                    • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                                      Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                                      rrb@infosec.exchangeR This user is from outside of this forum
                                      rrb@infosec.exchangeR This user is from outside of this forum
                                      rrb@infosec.exchange
                                      wrote last edited by
                                      #23

                                      @malwaretech I think it would be kinda cool.

                                      1 Reply Last reply
                                      0
                                      • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                                        Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                                        simonzerafa@infosec.exchangeS This user is from outside of this forum
                                        simonzerafa@infosec.exchangeS This user is from outside of this forum
                                        simonzerafa@infosec.exchange
                                        wrote last edited by
                                        #24

                                        @malwaretech

                                        Well only hijack / hack mobile connection when it's really necessary like when your princess has escaped and you want to kidnap her back.

                                        1 Reply Last reply
                                        0
                                        • malwaretech@infosec.exchangeM malwaretech@infosec.exchange

                                          Listening to cybersecurity people freak out over Mythos is so tiring. Like, bro, your local water treatment plant runs Windows XP, your mobile provider's hardware is older than you are, and the protocol that routes internet traffic is secured by everyone just agreeing that hijacking it would be uncool.

                                          jonnyt@mastodon.me.ukJ This user is from outside of this forum
                                          jonnyt@mastodon.me.ukJ This user is from outside of this forum
                                          jonnyt@mastodon.me.uk
                                          wrote last edited by
                                          #25

                                          @malwaretech And your company CEO's password is password.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups