Boredtoolbox's Avatar

Boredtoolbox

@boredtoolbox.bsky.social

17 Followers  |  5 Following  |  85 Posts  |  Joined: 11.08.2024  |  1.8371

Latest posts by boredtoolbox.bsky.social on Bluesky

Preview
Huawei Just Made a Weird Flip Phone (And It Doesn't Run Android) Interesting.

Did Huawei with it's HarmonyOS finally managed to move away from the Android Open Source Project (AOSP) code? πŸ€”

#infosec #technology #engineering #google #opensource #boredtoolbox

28.03.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Security Engineering By Boredtoolbox | Bored Toolbox | Substack A security engineering "learning" focused newsletter! Click to read Security Engineering By Boredtoolbox, by Bored Toolbox, a Substack publication. Launched 2 months ago.

4. Detection and Response / Red Teaming
5. Adjacent Benefits Risk Assessment Cycle
6. Continuous Control Monitoring
7. Federated Security Teams - Pull not Push

Subscribe to my newsletter: newsletter.boredtoolbox.pw

27.03.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

🚨 Security Engineering TIP:

Jim Collins' Flywheel concept to amplifying the effects of security programs:

1. Raise the Baseline by Reducing Control Costs
2. Threat Intelligence
3. From Inventories to Digital Twins: managed configurations for your assets

#security #engineering #infosec #technology

27.03.2025 04:00 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Security Bulletin: March 2025 BoredToolbox.

Latest confluence exploit Leads to LockBit Ransomware!

Read more and get TTPs here: boredtoolbox.pw/security-bul...
Subscribe to my newsletter: newsletter.boredtoolbox.pw

#lockbit #ransomware #malware #zeroday #bug #infosec #security #engineering #technology #boredtoolbox

26.03.2025 04:00 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
New Windows zero-day exploited by 11 state hacking groups since 2017 At least 11 state-backed hacking groups from North Korea, Iran, Russia, and China have been exploiting a new Windows vulnerability in data theft and cyber espionage zero-day attacks since 2017.

This heavily exploited Windows vulnerability (tracked as ZDI-CAN-25373)β€―allows attackers to exploit how Windows displays shortcut (.LNK) files to evade detection and execute code. Threat actors hide malicious command-line arguments within .LNK shortcut files

#infosec #security #engineering

25.03.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

I am option 4!

But option 9 gives me the willies! How are you able to do that on a daily basis? πŸ˜†

What about you?

#screens #coding #coder #github #programming #technology #engineer #boredtoolbox

24.03.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Israeli Spyware Graphite Targeted WhatsApp with 0-Click Exploit Follow us on Bluesky, Twitter (X) and Facebook at @Hackread

🚨 Most of the Whatsapp zero click exploit via adding users to groups can be protected against by enabling extra protection βœ…

Seetings > Privacy > Groups and chose who can add you to groups πŸ‘

#security #exploit #bug #malware #zeroday #engineering #technology #boredtoolbox

24.03.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

When you finally catch the bug in your code and it's Friday!


Subscribe to my newsletter: https://buff.ly/4goEsHm




#infosec #security #engineering #technology #boredtoolbox

14.02.2025 04:01 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Real life photo of a "pre-hacked" cyber security of a company!



Subscribe to my newsletter: https://buff.ly/4goEsHm


#infosec #security #engineering #technology #boredtoolbox

13.02.2025 04:00 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

When the Secure Intrusion Detection System worked and you block the attack! 😎 πŸ––


Subscribe to my newsletter to learn how: https://buff.ly/4goEsHm


#infosec

12.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

You selected computers because you were bad in language skills. But you joined a company and its...


Subscribe to my newsletter if your communication skills is just as bad as mine:
https://buff.ly/3ZiCdjE


#systemdesign #security #infosec #security #engineering #technology #boredtoolbox

11.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Fingerprints, facial recognition and other personal information from Biostar 2, a biometrics based physical security company, discovered on publicly accessible database.

Security team:
Please rotate your credentials!



Subscribe to my newsletter: https://buff.ly/4goEsHm
#infosec

10.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I saw a very weird person today at Starbucks. He had no smartphone, tablet or laptop. He just sat there drinking his coffee. What a psychopath!




#infosec

08.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

An amazing newsletter to go with your morning cup o' Joe:
https://buff.ly/4goEsHm

07.02.2025 04:25 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Shortcut to Secure System Design

- Walk to the coffee place
- Finish your coffee
- Walk back to the coffee place, to refill your coffee

β˜•


#infosec

07.02.2025 04:25 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

Number of days without seeing some CEO talk about Deepseek in my feed:

Subscribe to my newsletter: https://buff.ly/4goEsHm

#deepseek #ai #llm #chatgpt #engineering #technology #boredtoolbox

06.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Promise I use very less emojis in my newsletter:
https://buff.ly/4goEsHm

05.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

All the project needs now is a code review

The code:



#infosec

05.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

and subscription to an amazing newsletter like mine:
https://buff.ly/4goEsHm

04.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

All you need is a laptop and an internet connection!


#infosec

04.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Security Engineering By Boredtoolbox | Bored Toolbox | Substack A security engineering "learning" focused newsletter! Click to read Security Engineering By Boredtoolbox, by Bored Toolbox, a Substack publication. Launched 2 days ago.

Subscribe to my newsletter and leave an honest review:
https://buff.ly/4goEsHm

03.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Remember when game ratings matched user experience!
How can a game with an average 9 rating have such low audience rating?


#infosec

03.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Inbox | Substack

Read this before you start your infosec project πŸ‘‰
https://buff.ly/3PXgc4x

02.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

πŸ€” What you should remember before you start your Cybersecurity project
βœ… Check the comments


#infosec #career #cybersecurity #boredtoolbox

02.02.2025 04:00 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Inbox | Substack

Way better than paid learning:
https://buff.ly/3WK7o5N

01.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

πŸ”₯ My list of free resources to upskill your Cyber Security Career




#career #infosec

01.02.2025 04:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Bored Toolbox | Substack

My New Security Engineering Newsletter is also πŸ”₯
https://buff.ly/3Eu163R

31.01.2025 06:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Heard the latest Sequoia (macOS 15) updated was πŸ”₯




#infosec

31.01.2025 06:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

OpenAI and Microsoft accuse Deepseek of stealing training data!

Deepseek:



#techmeme

30.01.2025 08:30 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Pros:

Have fun with computer codes ❀️

Cons:

4:43 AM


#techmeme

30.01.2025 04:00 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@boredtoolbox is following 4 prominent accounts