Claudio Criscione's Avatar

Claudio Criscione

@criscio.net

Security Robot Overlord @ Google. Vulnerability Management

212
Followers
98
Following
37
Posts
01.07.2023
Joined
Posts Following

Latest posts by Claudio Criscione @criscio.net

Re entry blasts from maccheroni dropped from orbit (stored in said satellites)trigger localized emp shockwaves which selectively bitflip results in specific machines.
Easy, as long as you don't put cream in it.

29.01.2026 13:07 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

After a few days in Thailand.

Me: takes picture of "interesting" engineering solution in the streets

Wife: are you prepping for that slide deck *again*?

Me: ....

Wife: you promised you'd stop

Me: sorry love, this narrative basically writes itself!

27.04.2025 03:46 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Guess we are about to find out if we can prop up OSV fast enough.

15.04.2025 22:13 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

My kneejerk reaction to CVEs for EOL software is reasonably positive. It's clearly abusing the system, but would most likely have a net positive security impact in many cases.

23.01.2025 18:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

(of course I know of the various pwn2own-like, have visibility on a number of bounty programs, dealers etc. I'm specifically asking about a ready-to-use, commonly accepted resource)

06.01.2025 10:35 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I recently had to walk someone through their concerns of being targeted by hackers, and take steps to defend. One of the things we considered was "how much money will they spend on you", assessing the cost of 0days for a few software.

That got me wondering: do we have a handy, accepted pricelist?

06.01.2025 10:35 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Impressively enough none of them are correct.
Let's ask clippy:

It seems you are trying to translate Italian cousins. Don't you want to order McDonald's instead?

:)

27.12.2024 07:59 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

On the fifth day of Christmas, Thucydides sent to me
Tragic irony!
Four hundred oligarchs,
Fear, honour and interest,
A bipolar conflict
And a ΞΊΟ„αΏ†ΞΌΞ¬ ἐς Ξ±αΌ°Ξ΅α½Ά.

25.12.2024 15:04 πŸ‘ 107 πŸ” 15 πŸ’¬ 1 πŸ“Œ 0

CVE-2024-12727 Sophos coming in with an unauthenticated SQLi in their firewall appliance πŸ‘

22.12.2024 08:43 πŸ‘ 93 πŸ” 26 πŸ’¬ 2 πŸ“Œ 5

Repeat after me: I will not talk about vulnerability management until I've at least read CVSSv4 and understood it.

20.12.2024 12:33 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Deep down we all expect, at some point, out of the blue, you will just post something that revolutionizes security and we want to be the first to know and say "ah! All those chainsaws did not fool ME"

17.12.2024 21:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Ssssssst.

Trade secrets.

09.12.2024 13:58 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

I'm now reading Red Mars and it's great. Of course as any good book suggestion it's actually a trap.

09.12.2024 13:10 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Most fucking definitely.

06.12.2024 04:53 πŸ‘ 21 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

I can't quite believe it but I woke up this morning with the distinct feeling we might actually have a real, no BS usage for formally written down threat models.

My 24y old self pentester would laugh so hard at me I'd break a rib.

01.12.2024 16:58 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Picard management tip: Try your best to speak in a way the other person will understand, even when it seems nearly impossible.

01.12.2024 16:04 πŸ‘ 129 πŸ” 13 πŸ’¬ 6 πŸ“Œ 2

We have a few CVEs lying around if you ever feel like upping those numbers Lea :+)

01.12.2024 16:55 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

All jokes aside, I think cyber warfare would be tough as the baseline reliability of many critical IT systems isn't that great anyway.

01.12.2024 10:49 πŸ‘ 58 πŸ” 5 πŸ’¬ 8 πŸ“Œ 0

If Amazon could link my buying habits and your book tweets, they would probably give you some incentives to tweet more...

30.11.2024 18:36 πŸ‘ 3 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

#warhammer enjoyers and other hobbyists: Vallejo workers are on strike. Please try not to get any Vallejo product until the situation changes!

28.11.2024 20:14 πŸ‘ 161 πŸ” 101 πŸ’¬ 4 πŸ“Œ 5

Wiz really is a very serious player in vuln management. I like a number of things about dazz's tech. Well done.

22.11.2024 23:26 πŸ‘ 4 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

I'm only here for the shitposting sir

21.11.2024 23:46 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Yeah I probably have to fix stuff

19.11.2024 22:41 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

That's a very Jason answer :)

18.11.2024 21:32 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

@geffner.bsky.social I see you are working in scanning these days :+)

18.11.2024 21:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
oss-security - Fwd: wget-1.25.0 released [fixes CVE-2024-10524]

Look mum, a wget vuln!

www.openwall.com/lists/oss-se...

18.11.2024 21:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Oh, I never posted my gotofail story on here.

Early 2014, someone came to me about a catastrophic vulnerability in Apple's TLS implementation.

I shit you not, they'd overheard someone at a bar drunkenly bragging about how they were going to sell it to a FVEY intelligence agency for six figures.

17.11.2024 23:22 πŸ‘ 458 πŸ” 101 πŸ’¬ 7 πŸ“Œ 20

Word of advice: do not exclusively rely on agent(less) and/or cicd based scanning, unless you are purely serverless. Quite a few gaps you cannot pick up without network based, starting from trivial stuff like weak passwords.

Even a basic open source solution is better than nothing :)

08.11.2024 07:49 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0