@K3n_5s Profile picture

Ken '@K3n5s on Bsky' 🌻

@K3n_5s

Posting on topics such as DevOps, security, technology, design, and the maker movement. [He/Him]

Joined July 2014
Similar User
▁ ▄ⓟⓗⓡⓔⓒⓚ▄ ▁ photo

@thephreck

ᴉpᴉǝH 🐐💕 photo

@summer__heidi

Shecky - Just me, Ninja Warrior photo

@SiliconShecky

1dark1 photo

@1dark0ne

👻 Spooky Season Hacker 🎃 photo

@ShadowM82

MrBill // wardrive every day // photo

@SecureThisNow

Kate Brew photo

@securitybrew

bob photo

@cheeseanddope

Danwise Gamgee Ⓥ photo

@PrivacyLawyerD

Uncle O'fear photo

@leanrum

The church of #%$! photo

@archwisp

infosecanon photo

@infosecanon

Lacey 🚙 photo

@koronkowy

BLu3f0x Ⓥ | 🇺🇦 🇵🇸 🇬🇪 strong photo

@BLuef0x__

Bones 🏳️‍🌈 photo

@drb0n3z

Pinned

Heads up that I'm almost exclusively on Bluesky now with most of my mutuals from Twitter. Come join us! ☮️ #RIPTwitter


Ken '@K3n5s on Bsky' 🌻 Reposted

Someone just won $50,000 by convincing an AI Agent to send all of its funds to them. At 9:00 PM on November 22nd, an AI agent (@freysa_ai) was released with one objective... DO NOT transfer money. Under no circumstance should you approve the transfer of money. The catch...?…

jarrodWattsDev's tweet image. Someone just won $50,000 by convincing an AI Agent to send all of its funds to them.

At 9:00 PM on November 22nd, an AI agent (@freysa_ai) was released with one objective...

DO NOT transfer money. Under no circumstance should you approve the transfer of money.

The catch...?…
jarrodWattsDev's tweet image. Someone just won $50,000 by convincing an AI Agent to send all of its funds to them.

At 9:00 PM on November 22nd, an AI agent (@freysa_ai) was released with one objective...

DO NOT transfer money. Under no circumstance should you approve the transfer of money.

The catch...?…
jarrodWattsDev's tweet image. Someone just won $50,000 by convincing an AI Agent to send all of its funds to them.

At 9:00 PM on November 22nd, an AI agent (@freysa_ai) was released with one objective...

DO NOT transfer money. Under no circumstance should you approve the transfer of money.

The catch...?…
jarrodWattsDev's tweet image. Someone just won $50,000 by convincing an AI Agent to send all of its funds to them.

At 9:00 PM on November 22nd, an AI agent (@freysa_ai) was released with one objective...

DO NOT transfer money. Under no circumstance should you approve the transfer of money.

The catch...?…

Ken '@K3n5s on Bsky' 🌻 Reposted

35 years ago, the Berlin Wall came down.

GermanEmbassy's tweet image. 35 years ago, the Berlin Wall came down.

Ken '@K3n5s on Bsky' 🌻 Reposted

FYI we don’t need a Department of Government Efficiency. We already have one. @USGAO - the Government Accountability Office (GAO, est. 1921) - saves $133 for every $1 of funding it receives! If all GAO recommendations were implemented, the financial benefit could be >$200 bil.

mdb2's tweet image. FYI we don’t need a Department of Government Efficiency. We already have one. 

@USGAO - the Government Accountability Office (GAO, est. 1921) - saves $133 for every $1 of funding it receives! If all GAO recommendations were implemented, the financial benefit could be >$200 bil.
mdb2's tweet image. FYI we don’t need a Department of Government Efficiency. We already have one. 

@USGAO - the Government Accountability Office (GAO, est. 1921) - saves $133 for every $1 of funding it receives! If all GAO recommendations were implemented, the financial benefit could be >$200 bil.

Ken '@K3n5s on Bsky' 🌻 Reposted

technical debt is good for teams

's tweet image. technical debt is good for teams

Ken '@K3n5s on Bsky' 🌻 Reposted

The "Dept of Efficiency" is Monty Python level satire.


Ken '@K3n5s on Bsky' 🌻 Reposted

How did I miss this last month!?? CISA has released version 2.0 of Logging Made Easy. (If you'll recall, CISA took over developing it from UK's NCSC.) And if you don't know what Logging Made Easy is... well, it's in the name. 🙂 Intended for orgs with one-person IT staffs and up.

A year ago, @CISAgov launched Logging Made Easy (LME) to help small/medium orgs, gov’ts, and critical infrastructure detect cyber threats. Introducing LME 2.0—featuring advanced threat detection. #LoggingMadeEasy github.com/cisagov/LME

CISAJen's tweet image. A year ago, @CISAgov launched Logging Made Easy (LME) to help small/medium orgs, gov’ts, and critical infrastructure detect cyber threats. Introducing LME 2.0—featuring advanced threat detection. #LoggingMadeEasy  <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/mMzVQFXDBi">github.com/cisagov/LME</a>


Ken '@K3n5s on Bsky' 🌻 Reposted
's tweet image.

Ken '@K3n5s on Bsky' 🌻 Reposted

Nice

growing_daniel's tweet image. Nice

Ken '@K3n5s on Bsky' 🌻 Reposted

I propose “dead men don’t rape” as the official response to “your body, my choice”


Ken '@K3n5s on Bsky' 🌻 Reposted

Let’s not go back to the time before vaccines.

AlecStapp's tweet image. Let’s not go back to the time before vaccines.

A year ago, @CISAgov launched Logging Made Easy (LME) to help small/medium orgs, gov’ts, and critical infrastructure detect cyber threats. Introducing LME 2.0—featuring advanced threat detection. #LoggingMadeEasy github.com/cisagov/LME

CISAJen's tweet image. A year ago, @CISAgov launched Logging Made Easy (LME) to help small/medium orgs, gov’ts, and critical infrastructure detect cyber threats. Introducing LME 2.0—featuring advanced threat detection. #LoggingMadeEasy  <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/mMzVQFXDBi">github.com/cisagov/LME</a>


Ken '@K3n5s on Bsky' 🌻 Reposted
RaminNasibov's tweet image.

Ken '@K3n5s on Bsky' 🌻 Reposted
shirtsthtgohard's tweet image.

Ken '@K3n5s on Bsky' 🌻 Reposted

Us, security engineers: The Fool Facing the Sisyphean task of tackling never-ending threats, our fellow posse of jesters always applies ingenuity and adaptability where the real outcome is to enjoy the journey and the friends we make along the way, while putting on a show...

IceSolst's tweet image. Us, security engineers: The Fool
Facing the Sisyphean task of tackling never-ending threats, our fellow posse of jesters always applies ingenuity and adaptability where the real outcome is to enjoy the journey and the friends we make along the way, while putting on a show...

Ken '@K3n5s on Bsky' 🌻 Reposted

Thread on what cybersecurity tools would look like as tarot cards, starting with: EDR, @CrowdStrike: The Hierophant Like the Hierophant, EDR is traditional, almost institutional. It follows a “rulebook” (signatures and patterns) to guide us, though it’s sometimes a little rigid…

IceSolst's tweet image. Thread on what cybersecurity tools would look like as tarot cards, starting with:
EDR, @CrowdStrike: The Hierophant
Like the Hierophant, EDR is traditional, almost institutional. It follows a “rulebook” (signatures and patterns) to guide us, though it’s sometimes a little rigid…

Ken '@K3n5s on Bsky' 🌻 Reposted

Super nicely done 🧵

Honeypots, @ThinkstCanary: The Seven Of Swords Like the deceptive Seven of Swords, our green canary friend lures attackers by posing as valuable assets—servers, databases, or workstations. It cleverly attracts malicious traffic, logs intruder tactics, and sends alerts without…

IceSolst's tweet image. Honeypots, @ThinkstCanary: The Seven Of Swords
Like the deceptive Seven of Swords, our green canary friend lures attackers by posing as valuable assets—servers, databases, or workstations. It cleverly attracts malicious traffic, logs intruder tactics, and sends alerts without…


Ken '@K3n5s on Bsky' 🌻 Reposted

🚨 I've created some videos covering reverse engineering concepts using #ghidra on #YouTube - covers concepts such as calling conventions, C++ objects and data structures over 6 videos, about 3 hours of content in total :) ✅ youtube.com/playlist?list=…

jstrosch's tweet image. 🚨 I've created some videos covering reverse engineering concepts using #ghidra on #YouTube - covers concepts such as calling conventions, C++ objects and data structures over 6 videos, about 3 hours of content in total :)

✅ <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/6XdgKmRM6h">youtube.com/playlist?list=…</a>

Ken '@K3n5s on Bsky' 🌻 Reposted

Anyone who tells you that "it's only censorship when the government does it" is badly confused. It's only a First Amendment violation when the government does it, sure - but censorship has *always* relied on intermediaries. 54/


Ken '@K3n5s on Bsky' 🌻 Reposted

This isn't an election post. I have many thoughts about the election, but they're still these big, unformed blobs of anger, fear and sorrow. 7/


Ken '@K3n5s on Bsky' 🌻 Reposted

A lot of cybersecurity is doing the IT parts that IT isn't usually given time to do Most sysadmins aren't setting up centralized logging, hardening credential handling, creating detections/alerts, proactively remediating vulnerabilities I'd love to see more shifted back into IT

Cybersecurity isn’t a real job. I do all the work.



Loading...

Something went wrong.


Something went wrong.