spartan_1986@infosec.exchange
Posts
-
Gosh this was a (recent) first-hand lived experience. -
My hot take on the vulnpocalypse:@sophieschmieg 100% agree but I’ve one recent observation to add. Mythos reporting got our C-levels’ attention in a big way. This has had other tangential benefits. For example, our purple team (of which I’m a participant) have for many, many months (nearly two years now) recommended expanding our red team and increasing the number and type of penetration tests to include the company’s new AI “employees.” That was always met with a, “it’ll interfere with business development” denial. This week they came to us and asked how long would it take to ramp up. The plan had already been laid out and all that remains is to get stakeholders’ formal approval to test their new toys. That’s now assured because they are asking for it. It’ll start next week. And while vulns may not always be patched quickly, I feel it really lowers the risk to have a few well informed mitigations in place either via code, policies or SOP. Sometimes a little fear can move the needle in significant ways.
-
Sooo question on age restriction on Apple devices.@SecurityWriter I block all DNS at the packet level on my router. See, I can do packet inspection too. But if they have a home grown DNS protocol all their own would love to read about it. Then I’ll block that too.
Not sure it correlates, but my WiFi only iPad did an age thing this weekend when I did my daily Fallout Shelter thing. Wonder if those packet logs are still available… Anyway, besides my Wi-Fi subnet blocking external DNS requests, the iPad has NextDNS running. Are they just ignoring that whenever they want now?
I know my LG TV has hard wired DNS. That’s why it’s banished to the IoT subnet of shame. That subnet is very canonical.