Skip Navigation
InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CW
Cornelius_Wangenheim @lemmy.world
Posts 0
Comments 277
Nearly 20% of Microsoft SQL Servers running have passed end of support
  • What? There's lots of reasons to complain about Microsft, but their legacy support is not one of them. Almost every product they make gets 10 years of support + 3 more if you pay for it. In comparison, Postgres only does 5, MySQL is 8, and Mongo is 3.

  • Judge Orders Sale of Alex Jones’s Personal Assets but Keeps Infowars in Business
  • Laws and courts do not exist as ends in and of themselves. They're tools created to serve a greater purpose, namely to discourage and stop bad behavior. If the tool is failing at its primary purpose, it deserves criticism.

    Responding to criticisms about how the courts work with "but that's how the courts work" is missing the point.

  • Judge Orders Sale of Alex Jones’s Personal Assets but Keeps Infowars in Business
  • It was a defamation suit. Of course the goal is to shut him up and make him stop defaming his victims. The judgement is just the means to do that. Prioritizing the judgement over removing the tool he used to defame the aggrieved party is asinine.

  • Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says | ProPublica Investigation
  • It's mostly the responsibility of the client to build defense in depth. If is a straight shot from your Solarwinds server to your ADFS server, where the SAML signing keys are stored, that's your fault, not Solarwinds or Microsoft. Well, I would still blame Solarwinds, because they were encouraging horribly insecure practices, like doing "agentless" monitoring using a highly privileged account.

    In this case, yes, not letting a SAML assertion signed by the ADFS server authenticate to Azure reduces defense in depth. But if you're at the point where your authentication servers have been compromised, you're already so turbo-fucked that it's very unlikely a wall like that would stop an attacker for long.

  • Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says | ProPublica Investigation
  • Oof, that was painful to read as someone in cybersecurity. I respect ProPublica, but they have no idea what they're talking about.

    The Solarwinds hack was caused by Solarwinds being absolutely god awful at cybersecurity. The password to their update server was "solarwinds123", which we know because they accidentally published it in a public Github repo. The company is a complete and utter clown show.

    As for Golden SAML, almost nobody in cybersecurity would consider it a vulnerability. It's just a fundamental part of how asymmetric cryptography works. HTTPS suffers from the same issue. If your private key gets stolen and used to forge signatures, the problem is you not properly protecting it, not the technology requiring you to keep it secret.

    A more valid complaint is that Microsoft has been neglecting their on-prem software in favor of Azure. There are tons of security features that they've added to Azure that will probably never make their way to ADFS or Exchange.

  • Wells Fargo fires more than a dozen employees for faking work using mouse jigglers and keyboard activity simulation
  • I've been the one identifying the people who use jigglers. Usually it was a manager coming to us to look for a reason to fire a poor employee or a contractor trying to bill a suspiciously large number of hours for the work produced. If it was just poor performance, HR would make us do a PIP and waste 3 months on them. Violating security procedures and falsifying time sheets was an immediate termination. And for the contractors, you need evidence in order to refuse payment.

    Btw, if you want to get away with it, don't use a software or USB one. Get one that interfaces with a regular mouse. Modern cybersecurity software logs every process executed and device connected.