Doom Labs's Avatar

Doom Labs

@doomlabs

Oz based Sec Analyst, IR survivor and professional procrastinator. Attracted to uncommon sense, consuming and endless learning. Just like you, I'm cooler online. If you've made it this far...don't forget to call your mum once in awhile for $%#* sake!

197
Followers
1,386
Following
14
Posts
16.11.2024
Joined
Posts Following

Latest posts by Doom Labs @doomlabs

hopefully the back to the future trilogy won’t become a back to the future cinematic universe

13.12.2025 23:07 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Generative AI was used to draft this story, based on information provided by federal charging documents. It was reviewed and edited by MassLive.com.

Generative AI was used to draft this story, based on information provided by federal charging documents. It was reviewed and edited by MassLive.com.

What the fuck?! MassLive is now using generative "AI" to create articles, which would be bad enough in any context but is especially egregious when publishing allegations that someone committed a crime.

@masslive.bsky.social #Massachusetts #mapoli

www.masslive.com/news/2025/10...

16.10.2025 19:36 πŸ‘ 322 πŸ” 113 πŸ’¬ 16 πŸ“Œ 36

Turning Windows into a more expensive Alexa is probably right there with the dumbest decision in tech since Microsoft's infamous Xbox One launch that basically killed its console forever

16.10.2025 18:52 πŸ‘ 10 πŸ” 2 πŸ’¬ 1 πŸ“Œ 2
DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson
DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson CS Malware is rare. Yet, ICS Malware like FrostyGoop and TRISIS, and related discoveries like COSMICENERGY, were all found on VirusTotal, so analysts still hunt for novel ICS Malware in public malware repositories. In the process, they discover all kinds of tools: research, CTFs, obfuscated nonsense

Our DEF CON33 ICS Village talk is now on YouTube!

@sam-hans0n.bsky.social and I share stories of malware we discovered while searching for ICS threats, and discuss our approach to assessing their reputation.

Don't Cry Wolf: Evidence-Based Assessment of ICS Threats

16.10.2025 19:18 πŸ‘ 6 πŸ” 5 πŸ’¬ 0 πŸ“Œ 1

Cool, finally a place kids can enjoy.

09.10.2025 03:05 πŸ‘ 49 πŸ” 16 πŸ’¬ 4 πŸ“Œ 0
Photo of Brian Krebs aka krebsonsecurity

Photo of Brian Krebs aka krebsonsecurity

Brian Krebs taking security and AI at CyberCon
#cybersecurity
#CyberCon

15.10.2025 22:19 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

In a world where basic human rights, things as simple as a living wage or going to the doctor or just using the damn public restroom, are being sneeringly taken away, anyone who says they "don't follow politics" or the like is living in massive denial of what politics is and how it affects them.

15.10.2025 21:58 πŸ‘ 25 πŸ” 5 πŸ’¬ 1 πŸ“Œ 0

"I'm really into evaluating threat models, but I'm not so into understanding actions taken by groups, or power relations, or what the impact of various events are on groups."

(I know "into cybersecurity not politics" just means "i think finding IOCs is cool" ie "i'm bad at cybersecurity" but still)

15.10.2025 21:55 πŸ‘ 19 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

Who the fuck wants this?

16.10.2025 13:48 πŸ‘ 114 πŸ” 23 πŸ’¬ 20 πŸ“Œ 3

Trump's new AI Action Plan contains a number of sections related to cybersecurity, including protecting AI users from attacks and developing secure models. www.whitehouse.gov/wp-content/u...

Quick run-through... 🧡

23.07.2025 17:38 πŸ‘ 8 πŸ” 3 πŸ’¬ 1 πŸ“Œ 1
Fully Operational Stuxnet 15 Years Later & the Evolution of Cyber Threats to Critical Infrastructure
Fully Operational Stuxnet 15 Years Later & the Evolution of Cyber Threats to Critical Infrastructure YouTube video by Homeland Security Committee Events

Stuxnet hearing stream:

www.youtube.com/watch?v=jLRO...

22.07.2025 14:18 πŸ‘ 8 πŸ” 4 πŸ’¬ 0 πŸ“Œ 1
Post image

Recipients be like…

22.07.2025 20:55 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
a screenshot of a text message, which claims to be a UPS Ground redelivery notice but is obviously a scam text. There are 19 people on this text message chain.

a screenshot of a text message, which claims to be a UPS Ground redelivery notice but is obviously a scam text. There are 19 people on this text message chain.

Hell is a scam group text sent to 18 other people.

22.07.2025 17:05 πŸ‘ 23 πŸ” 1 πŸ’¬ 3 πŸ“Œ 1
an Axios headline that reads: "OpenAI CEO Sam Altman warns of AI 'fraud crisis' targeting consumer accounts"

an Axios headline that reads: "OpenAI CEO Sam Altman warns of AI 'fraud crisis' targeting consumer accounts"

a meme of a guy in a hot dog suit, with the caption: "We're all trying to find the guy who did this"

a meme of a guy in a hot dog suit, with the caption: "We're all trying to find the guy who did this"

When AI "leaders" warn of AI problems.

22.07.2025 18:28 πŸ‘ 20 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0
Preview
These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more | TechCrunch These are our favorite cybersecurity books, both by fiction authors, as well as journalists and researchers.

Huge thanks to @lorenzofb.bsky.social for the humbling inclusion of Hack To The Future on this list β€οΈπŸ’™πŸ€

techcrunch.com/2025/07/19/t...

20.07.2025 00:21 πŸ‘ 29 πŸ” 6 πŸ’¬ 1 πŸ“Œ 0
Post image

Oh the critical vuln is in SHAREPOINT, gotcha

20.07.2025 17:25 πŸ‘ 27 πŸ” 5 πŸ’¬ 2 πŸ“Œ 0
Home Seriously - do you really need endpoints directly exposed to the outside world for the sake of efficiency or convenience? Do you really require your data immediately accessible to external users? GE...

With SharePoint-mageddon going on, a reminder:
Getyourshitofftheinternet.com

20.07.2025 23:57 πŸ‘ 9 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
In that article, I wrote about my best friend who died of cystic fibrosis when Iβ€”and sheβ€”was 25. In an article I wrote for VICE, I explained that I blame America’s health insurance system for her death. She lived the vast majority of her life before Obamacare existed and was at times dropped from insurance in between jobs for her preexisting condition. She regularly had to skip medicine or treatments she needed to live because she could not afford them or because her insurance would not cover them or because she did not have insurance. Getting those medicines was like the world’s most time consuming and frustrating monthly puzzle. I remember for a while she was getting medication from an online pharmacy that had games and surveys you could play to get small discounts on prescriptions. She did those games every month to save a few dollars not because she wanted to save a few dollars but because she had to do them to literally afford her medicine. She looked into getting medication that was cheaper in Canada but could not navigate the system. She died 11 years ago. Millions of people died under a similar health insurance regime before her and millions of people have died under the same system after her. Her death fucked up my world and I have never been the same.

In that article, I wrote about my best friend who died of cystic fibrosis when Iβ€”and sheβ€”was 25. In an article I wrote for VICE, I explained that I blame America’s health insurance system for her death. She lived the vast majority of her life before Obamacare existed and was at times dropped from insurance in between jobs for her preexisting condition. She regularly had to skip medicine or treatments she needed to live because she could not afford them or because her insurance would not cover them or because she did not have insurance. Getting those medicines was like the world’s most time consuming and frustrating monthly puzzle. I remember for a while she was getting medication from an online pharmacy that had games and surveys you could play to get small discounts on prescriptions. She did those games every month to save a few dollars not because she wanted to save a few dollars but because she had to do them to literally afford her medicine. She looked into getting medication that was cheaper in Canada but could not navigate the system. She died 11 years ago. Millions of people died under a similar health insurance regime before her and millions of people have died under the same system after her. Her death fucked up my world and I have never been the same.

Here @jasonkoebler.bsky.social writes his friend was filling out surveys/games to get few dollars off essential medication. People are outpouring their "horrendous, inhumane, heartbreaking experiences with a profit-driven, private American healthcare system" www.404media.co/behind-the-b...

06.12.2024 17:37 πŸ‘ 189 πŸ” 54 πŸ’¬ 1 πŸ“Œ 7

Another day, another pointless BC story that's just an ad for 0Patch. I won't link it. Without vulnerability details or a CVE ID, there is no useful information for the reader other than "Use this product," which is, y'know, an advertisement.

06.12.2024 17:37 πŸ‘ 7 πŸ” 1 πŸ’¬ 2 πŸ“Œ 0

Facebook, WhatsApp snd Snap already prohibit under 13s from joining. All this does is raise existing self imposed minimums by three years and ask that social networks take reasonable steps to enforce

29.11.2024 08:30 πŸ‘ 20 πŸ” 1 πŸ’¬ 7 πŸ“Œ 1
Preview
ByteDance seeks $1.1 mln damages from intern in AI breach case, report says China's ByteDance is suing a former intern for $1.1 million, alleging he deliberately attacked its artificial intelligence large language model training infrastructure, a case that has drawn widespread attention within China amid a heated AI race.

What's the purpose of trying to get $1.1 million out of an intern? Just the principle of it all?

ByteDance seeks $1.1 mln damages from intern in AI breach case, report says
www.reuters.com/technology/a...

29.11.2024 13:12 πŸ‘ 5 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

SYDNEY, Nov 28 (Reuters) - Australia's upper house of parliament on Thursday passed legislation banning social media for children aged under 16 that could set a standard for other countries to follow as Big Tech faces challenges globally over its power.

28.11.2024 12:22 πŸ‘ 1 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
North Korean hackers have stolen billions in crypto by posing as VCs, recruiters and IT workers | TechCrunch Security researchers say North Korean hackers have infiltrated hundreds of organizations with the goal of taking money and stealing data to further the regime's nuclear weapons program.

New, by me: Security researchers say North Korean hackers, posing as VCs, recruiters, and remote IT workers, have infiltrated "hundreds of organizations" and stolen billions of crypto in recent years to fund the regime's nuke program.

My dispatch from Cyberwarcon: techcrunch.com/2024/11/28/n...

28.11.2024 14:02 πŸ‘ 161 πŸ” 69 πŸ’¬ 6 πŸ“Œ 14
Post image

Sekoia has published some pretty comprehensive research on how ransomware gangs exfiltrate data from compromised environments.

blog.sekoia.io/ransomware-d...

28.11.2024 17:08 πŸ‘ 53 πŸ” 23 πŸ’¬ 4 πŸ“Œ 1
Preview
Exclusive | Chinese Ship’s Crew Suspected of Deliberately Dragging Anchor for 100 Miles to Cut Baltic Cables NATO warships have surrounded Yi Peng 3, a Chinese bulk carrier at the center of an international probe into suspected sabotage.

Chinese vessel suspected of deliberately severing two critical European data cables last week by dragging anchor along the Baltic seabed for 100 miles. Probe assessing whether ship's captain induced by Russian intelligence to engage in sabotage: www.wsj.com/world/europe...

28.11.2024 17:50 πŸ‘ 19 πŸ” 3 πŸ’¬ 2 πŸ“Œ 0
Preview
Tor in Russia: A call for more WebTunnel bridges | Tor Project As the Russian government intensifies its grip on the internet, censorship circumvention tools like Tor are more critical than ever. Here's the latest on Tor censorship in Russia and how you can help ...

Tor Project has "urgent need" for 200 new bridges to bypass Russian censorship

blog.torproject.org/call-for-web...

28.11.2024 11:12 πŸ‘ 19 πŸ” 10 πŸ’¬ 0 πŸ“Œ 1