Doom Labs

Doom Labs

@doomlabs.bsky.social

Oz based Sec Analyst, IR survivor and professional procrastinator. Attracted to uncommon sense, consuming and endless learning. Just like you, I'm cooler online. If you've made it this far...don't forget to call your mum once in awhile for $%#* sake!

197 Followers 1,386 Following 14 Posts Joined Nov 2024
3 months ago

hopefully the back to the future trilogy won’t become a back to the future cinematic universe

2 1 0 0
4 months ago
Generative AI was used to draft this story, based on information provided by federal charging documents. It was reviewed and edited by MassLive.com.

What the fuck?! MassLive is now using generative "AI" to create articles, which would be bad enough in any context but is especially egregious when publishing allegations that someone committed a crime.

@masslive.bsky.social #Massachusetts #mapoli

www.masslive.com/news/2025/10...

322 113 16 36
4 months ago

Turning Windows into a more expensive Alexa is probably right there with the dumbest decision in tech since Microsoft's infamous Xbox One launch that basically killed its console forever

10 2 1 2
4 months ago
YouTube
DEF CON 33 - Don’t Cry Wolf: Evidence based assessments of ICS Threats - Jimmy Wylie & Sam Hanson CS Malware is rare. Yet, ICS Malware like FrostyGoop and TRISIS, and related discoveries like COSMICENERGY, were all found on VirusTotal, so analysts still hunt for novel ICS Malware in public malware repositories. In the process, they discover all kinds of tools: research, CTFs, obfuscated nonsense

Our DEF CON33 ICS Village talk is now on YouTube!

@sam-hans0n.bsky.social and I share stories of malware we discovered while searching for ICS threats, and discuss our approach to assessing their reputation.

Don't Cry Wolf: Evidence-Based Assessment of ICS Threats

6 5 0 1
5 months ago

Cool, finally a place kids can enjoy.

49 16 4 0
4 months ago
Photo of Brian Krebs aka krebsonsecurity

Brian Krebs taking security and AI at CyberCon
#cybersecurity
#CyberCon

1 1 0 0
4 months ago

In a world where basic human rights, things as simple as a living wage or going to the doctor or just using the damn public restroom, are being sneeringly taken away, anyone who says they "don't follow politics" or the like is living in massive denial of what politics is and how it affects them.

25 5 1 0
4 months ago

"I'm really into evaluating threat models, but I'm not so into understanding actions taken by groups, or power relations, or what the impact of various events are on groups."

(I know "into cybersecurity not politics" just means "i think finding IOCs is cool" ie "i'm bad at cybersecurity" but still)

19 3 0 0
4 months ago

Who the fuck wants this?

114 23 20 3
7 months ago

Trump's new AI Action Plan contains a number of sections related to cybersecurity, including protecting AI users from attacks and developing secure models. www.whitehouse.gov/wp-content/u...

Quick run-through... 🧵

8 3 1 1
7 months ago
YouTube
Fully Operational Stuxnet 15 Years Later & the Evolution of Cyber Threats to Critical Infrastructure YouTube video by Homeland Security Committee Events

Stuxnet hearing stream:

www.youtube.com/watch?v=jLRO...

8 4 0 1
7 months ago
Post image

Recipients be like…

0 0 0 0
7 months ago
a screenshot of a text message, which claims to be a UPS Ground redelivery notice but is obviously a scam text. There are 19 people on this text message chain.

Hell is a scam group text sent to 18 other people.

23 1 3 1
7 months ago
an Axios headline that reads: "OpenAI CEO Sam Altman warns of AI 'fraud crisis' targeting consumer accounts" a meme of a guy in a hot dog suit, with the caption: "We're all trying to find the guy who did this"

When AI "leaders" warn of AI problems.

20 3 1 0
7 months ago
Preview
These are our favorite cyber books on hacking, espionage, crypto, surveillance, and more | TechCrunch These are our favorite cybersecurity books, both by fiction authors, as well as journalists and researchers.

Huge thanks to @lorenzofb.bsky.social for the humbling inclusion of Hack To The Future on this list ❤️💙🤍

techcrunch.com/2025/07/19/t...

29 6 1 0
7 months ago
Post image

Oh the critical vuln is in SHAREPOINT, gotcha

27 5 2 0
7 months ago
Home Seriously - do you really need endpoints directly exposed to the outside world for the sake of efficiency or convenience? Do you really require your data immediately accessible to external users? GE...

With SharePoint-mageddon going on, a reminder:
Getyourshitofftheinternet.com

9 3 0 0
1 year ago
In that article, I wrote about my best friend who died of cystic fibrosis when I—and she—was 25. In an article I wrote for VICE, I explained that I blame America’s health insurance system for her death. She lived the vast majority of her life before Obamacare existed and was at times dropped from insurance in between jobs for her preexisting condition. She regularly had to skip medicine or treatments she needed to live because she could not afford them or because her insurance would not cover them or because she did not have insurance. Getting those medicines was like the world’s most time consuming and frustrating monthly puzzle. I remember for a while she was getting medication from an online pharmacy that had games and surveys you could play to get small discounts on prescriptions. She did those games every month to save a few dollars not because she wanted to save a few dollars but because she had to do them to literally afford her medicine. She looked into getting medication that was cheaper in Canada but could not navigate the system. She died 11 years ago. Millions of people died under a similar health insurance regime before her and millions of people have died under the same system after her. Her death fucked up my world and I have never been the same.

Here @jasonkoebler.bsky.social writes his friend was filling out surveys/games to get few dollars off essential medication. People are outpouring their "horrendous, inhumane, heartbreaking experiences with a profit-driven, private American healthcare system" www.404media.co/behind-the-b...

189 54 1 7
1 year ago

Another day, another pointless BC story that's just an ad for 0Patch. I won't link it. Without vulnerability details or a CVE ID, there is no useful information for the reader other than "Use this product," which is, y'know, an advertisement.

7 1 2 0
1 year ago

Facebook, WhatsApp snd Snap already prohibit under 13s from joining. All this does is raise existing self imposed minimums by three years and ask that social networks take reasonable steps to enforce

20 1 7 1
1 year ago
Preview
ByteDance seeks $1.1 mln damages from intern in AI breach case, report says China's ByteDance is suing a former intern for $1.1 million, alleging he deliberately attacked its artificial intelligence large language model training infrastructure, a case that has drawn widespread attention within China amid a heated AI race.

What's the purpose of trying to get $1.1 million out of an intern? Just the principle of it all?

ByteDance seeks $1.1 mln damages from intern in AI breach case, report says
www.reuters.com/technology/a...

5 1 1 0
1 year ago

SYDNEY, Nov 28 (Reuters) - Australia's upper house of parliament on Thursday passed legislation banning social media for children aged under 16 that could set a standard for other countries to follow as Big Tech faces challenges globally over its power.

1 2 0 0
1 year ago
Preview
North Korean hackers have stolen billions in crypto by posing as VCs, recruiters and IT workers | TechCrunch Security researchers say North Korean hackers have infiltrated hundreds of organizations with the goal of taking money and stealing data to further the regime's nuclear weapons program.

New, by me: Security researchers say North Korean hackers, posing as VCs, recruiters, and remote IT workers, have infiltrated "hundreds of organizations" and stolen billions of crypto in recent years to fund the regime's nuke program.

My dispatch from Cyberwarcon: techcrunch.com/2024/11/28/n...

161 69 6 14
1 year ago
Post image

Sekoia has published some pretty comprehensive research on how ransomware gangs exfiltrate data from compromised environments.

blog.sekoia.io/ransomware-d...

53 23 4 1
1 year ago
Preview
Exclusive | Chinese Ship’s Crew Suspected of Deliberately Dragging Anchor for 100 Miles to Cut Baltic Cables NATO warships have surrounded Yi Peng 3, a Chinese bulk carrier at the center of an international probe into suspected sabotage.

Chinese vessel suspected of deliberately severing two critical European data cables last week by dragging anchor along the Baltic seabed for 100 miles. Probe assessing whether ship's captain induced by Russian intelligence to engage in sabotage: www.wsj.com/world/europe...

19 3 2 0
1 year ago
Preview
Tor in Russia: A call for more WebTunnel bridges | Tor Project As the Russian government intensifies its grip on the internet, censorship circumvention tools like Tor are more critical than ever. Here's the latest on Tor censorship in Russia and how you can help ...

Tor Project has "urgent need" for 200 new bridges to bypass Russian censorship

blog.torproject.org/call-for-web...

19 10 0 1