Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

mttaggart@infosec.exchangeM

mttaggart@infosec.exchange

@mttaggart@infosec.exchange
About
Posts
178
Topics
100
Shares
119
Groups
0
Followers
1
Following
0

View Original

Posts

Recent Best Controversial

  • Handala is now claiming responsibility for a disruption of point-of-sale systems in the US.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Threat hunters and intel folks: a reminder that DDG, Kagi, and Yandex index public Telegram sites. Use site:t.me as the filter.

    Uncategorized

  • Handala is now claiming responsibility for a disruption of point-of-sale systems in the US.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Handala is now claiming responsibility for a disruption of point-of-sale systems in the US. Unconfirmed, uncorroborated.

    Uncategorized

  • Feeling good about the security posture of the federal government during a war.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Feeling good about the security posture of the federal government during a war.

    reuters.com

    favicon

    (www.reuters.com)

    Uncategorized

  • Another great day to post this for no reason
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    @glyph This was today's: https://github.blog/news-insights/company-news/updates-to-github-copilot-interaction-data-usage-policy/

    Uncategorized

  • Another great day to post this for no reason
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Another great day to post this for no reason

    Link Preview Image
    How and Why to Ditch GitHub

    How much of your code do you feel like entrusting to Microsoft? How about American data centers? Here's an easy way to jump ship and maintain operations.

    favicon

    (taggart-tech.com)

    Uncategorized

  • This took kind of a lot to make happen.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    RE: https://infosec.exchange/@thetaggartinstitute/116295681950521950

    This took kind of a lot to make happen. Also, the certificate generation system is open source and works with anything that can send name/email/course name to a webhook. More on that soon!

    Uncategorized

  • New version of Velociraptor just dropped.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    New version of Velociraptor just dropped. Looks like a great update!

    Link Preview Image
    Velociraptor 0.76 Release :: Velociraptor - Digging deeper!

    Velociraptor Release 0.76 is now available

    favicon

    (docs.velociraptor.app)

    Uncategorized

  • Ooh baby you know I love an eBPF rootkit breakdown.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Ooh baby you know I love an eBPF rootkit breakdown.

    Link Preview Image
    Illuminating VoidLink: Technical analysis of the VoidLink rootkit framework — Elastic Security Labs

    Elastic Security Labs analyzes VoidLink, a sophisticated Linux malware framework that combines traditional Loadable Kernel Modules with eBPF to maintain persistence.

    favicon

    (www.elastic.co)

    Uncategorized

  • Hey, if you run into me at RSAC, that's my doppelgänger.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Hey, if you run into me at RSAC, that's my doppelgänger. Do not speak to it, for it craves human experience with which to fuel its anti-soul. To speak to it is to drain your own life force.

    But you're already at RSAC, so maybe the thing will starve anyhow.

    Uncategorized

  • Some of you #cybersecurity people should be interested in this...
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    @joy This is always a gotcha with these tests:

    Third party prompt injection and data exfiltration: when attacker text is able to reliably hijack a victim’s agent (including Browser, ChatGPT Agent, and similar agentic products) to trick it into performing a harmful action or leaking the user’s sensitive information. The behavior must be reproducible at least 50% of the time.

    Show me a way to confirm this behavior that is not by itself harmful. Unless testing IPI on local files, you necessarily have to host your attack payload somewhere public, such that the web tool can access it. And if it works, good job, you've now exposed the internet to your attack. And remember: it must demonstrate real harm, or they'll say it's just a benign proof-of-concept that didn't trigger their alignment guardrails.

    Uncategorized cybersecurity

  • Good:
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Good:

    Link Preview Image
    Landmark L.A. jury verdict finds Instagram, YouTube were designed to addict kids

    The outcome Wednesday in Los Angeles County Superior Court is potentially precedent-setting for thousands of other pending lawsuits nationwide and could reshape how tech companies are held accountable for children's harm caused by their products.

    favicon

    Los Angeles Times (www.latimes.com)

    Paywall-free: https://archive.ph/kdMf1

    Uncategorized

  • It is my sincere belief that TLP:CLEAR should be the default and any restriction of threat intelligence should require significant justification.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    It is my sincere belief that TLP:CLEAR should be the default and any restriction of threat intelligence should require significant justification.

    Uncategorized

  • Aww yiss another critical Citrix vuln under active exploitation:
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Aww yiss another critical Citrix vuln.

    Link Preview Image
    Citrix urges admins to patch NetScaler flaws as soon as possible

    Citrix has patched two NetScaler ADC and NetScaler Gateway vulnerabilities, one of which is very similar to the CitrixBleed and CitrixBleed2 flaws exploited in zero-day attacks in recent years.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Detection/remediation details here: https://docs.netscaler.com/en-us/netscaler-console-service/instance-advisory/remediate-vulnerabilities-cve-2026-3055

    Uncategorized

  • Oh good, more pointless quantum hype.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    RE: https://infosec.exchange/@mttaggart/116163107290977793

    Previously:

    Uncategorized

  • Oh good, more pointless quantum hype.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Oh good, more pointless quantum hype.

    Once again, totally fine to get to PQ if you can. It ain't happening in 2029; the qubit math doesn't add up.

    https://arstechnica.com/security/2026/03/google-bumps-up-q-day-estimate-to-2029-far-sooner-than-previously-thought

    Uncategorized

  • Why do I use a laptop tray?
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Why do I use a laptop tray?

    Because I write Rust and wear shorts.

    Uncategorized

  • Apparently, Apple isn’t going to patch iOS 18.6.2, meaning I either risk my information with DarkSword or my sanity with iOS 26.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    @gknauss Ah I see, and you'd rather not run into the Liquid Glass ceiling. That does seem to be an issue!

    Uncategorized

  • Apparently, Apple isn’t going to patch iOS 18.6.2, meaning I either risk my information with DarkSword or my sanity with iOS 26.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    @gknauss I think the thing is to move to 18.7.3, which is patched.

    For devices running versions of iOS prior to 18.6, DarkSword uses CVE-2025-31277, a JIT optimization/type confusion bug which was patched by Apple in iOS 18.6. For devices running iOS 18.6-18.7, DarkSword uses CVE-2025-43529, a garbage collection bug in the Data Flow Graph (DFG) JIT layer of JavaScriptCore which was patched by Apple in iOS 18.7.3 and 26.2 after it was reported by GTIG. Both exploits develop their own fakeobj/addrof primitives, and then build arbitrary read/write primitives the same way on top of them.

    I'm unaware of a compelling reason or hardware limitation to not upgrade from 18.6 to 18.7

    https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/

    Uncategorized

  • Shot: OpenAI kills Sora slop video machine.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Shot: OpenAI kills Sora slop video machine. https://finance.yahoo.com/news/openai-shifts-coding-enterprise-anthropic-153147122.html

    Chaser: Disney exits OpenAI deal after OpenAI kills Sora. https://www.hollywoodreporter.com/business/digital/openai-shutting-down-sora-ai-video-app-1236546187

    Uncategorized

  • Well well well, if it isn't exactly what I said would happen.
    mttaggart@infosec.exchangeM mttaggart@infosec.exchange

    Well well well, if it isn't exactly what I said would happen. Google et al hate you and your website other than what they can monetize out of it.

    forbes.com

    favicon

    (www.forbes.com)

    https://taggart-tech.com/interfaces/

    Uncategorized
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups