come work with me! @oxide.computer is currently hiring for a whole bunch of different engineering roles, up and down the stack β from distributed systems to electrical engineering!
come work with me! @oxide.computer is currently hiring for a whole bunch of different engineering roles, up and down the stack β from distributed systems to electrical engineering!
Offensive Oxide marketing copy when?
Pete Hegseth: "We are currently clean on OPSEC"
Scoop: The databases powering DOGE.gov are insecure, and people outside the government have already pushed their own updates to the site to prove it:
www.404media.co/anyone-can-p...
Device code phishing strikes again www.volexity.com/blog/2025/02...
I think that's an example of extractors, not a middleware layer, like with Axum and Tower.
You can implement your own extractors in dropshot as well, but not those that are generic over your context, so you're left with doing the function call as you have here.
Related: github.com/oxidecompute...
C IS LEGAL AGAIN
Based
New version of Product Security Bad Practices from CISA just dropped.
www.cisa.gov/resources-to...
After the holidays I am ready for my vacation next week where I return to work.
Lately, every BSides seems to have a talk on reframing security teams as a βDepartment of Yesβ
We donβt hear nearly as much about the value of a well-considered, strategically deployed βNoβ
I've pulled together guidance on giving a better, more constructive No:
ramimac.me/saying-no
I've never felt so seen and attacked at the same time.
youtu.be/4gygGeLsU7A
Picture of a door labeled Palisades Tahoe Security that is not fully closed.
FAIL
Forgot to mention OSCAL, which provides all 800-53 controls and enhancements in structured formats (incl JSON) has been very helpful.
But still. Damn.
The Security Baselines and Control Summaries tables are very helpful in sifting through which of 1190 controls and enhancements I might care about, which I am thankful for.
NIST SP 800-53 Rev 5 is a grind.
Picture of 0day IPA 12 oz can from Jailbreak Brewing.
hack the planet
Photo of the Apollo 11 command module Columbia at the Smithsonian National Air and Space museum.
First time in DC. Got to see the Apollo 11 command module at the Smithsonian National Air and Space museum.
Yeah, we reserved a CVE but were waiting to publish the details on our site before filling it out. We'll get that CVE updated.
To be clear, all Oxide advisories are public.
Public Oxide security advisories are live!
docs.oxide.computer/security