|
Ulf posted:assuming you have a more real-time comm tool like slack or teams then you can just ignore email, you can just filter everything to trash and nobody will even notice or call you on it ime this is great except like two of our execs only ever communicate via email and when i have tried to message them on slack they never got back to me
|
![]() |
|
![]()
|
# ? Jun 5, 2023 13:39 |
|
Trabisnikof posted:the best is running a pishing campaign then chiding anyone who clicked for ever clicking on out of domain emails our new CISO is currently sending out emails demanding everyone download and install this software that is basically "zabbix + active directory but in the cloud for idiots who don't know how to use zabbix or active directory" in between the emails demanding everyone never ever click any links to download and install anything ever
|
![]() |
|
Trabisnikof posted:the best is running a pishing campaign then chiding anyone who clicked for ever clicking on out of domain emails Luv2get emails for mandatory security training in an email I would 100% mash the "phishing" button on because they ended up being the lowest bidder or whatever other absurd rationale made them the choice.
|
![]() |
|
Trabisnikof posted:the best is running a pishing campaign then chiding anyone who clicked for ever clicking on out of domain emails ![]() ![]()
|
![]() |
|
post hole digger posted:
already see where this is going, "THEN WHY DIDN'T YOU HIT THE BUTTON IN OUTLOOK THAT REPORTS THE EMAIL AS PHISHING HUH??"
|
![]() |
|
post hole digger posted:
most emails should be ignored
|
![]() |
|
post hole digger posted:
Lmao they're soooooo close to getting it.
|
![]() |
|
post hole digger posted:
Not seeing the issue here.
|
![]() |
|
I've been very fond of this email I got at work:quote:Hello <my first name>: Vanadium fucked around with this message at 19:09 on Jun 21, 2022 |
![]() |
|
my work email has two folders: github notifications and everything else. i glance over "everything else" once every few days and then usually just hit mark all as read
|
![]() |
|
Vanadium posted:I've been very fond of this email I got at work: ![]()
|
![]() |
|
Vanadium posted:I've been very fond of this email I got at work: ![]() unrelated, i have been asked to give a presentation on IT security to a client at their company retreat next week. should be hilarious.
|
![]() |
|
I just want simulated phishing to go away entirely. I don't want my staff to waste the mouse clicks in settings it up. User education seems to be less valuable every year. If the tech doesn't work, users aren't going to save you.
|
![]() |
|
post hole digger posted:
and so it was by not touching phish that the student touched fish and became enlightened
|
![]() |
|
Vanadium posted:I've been very fond of this email I got at work: lmao Sickening posted:I just want simulated phishing to go away entirely. I don't want my staff to waste the mouse clicks in settings it up. User education seems to be less valuable every year. If the tech doesn't work, users aren't going to save you. this is my feelings on the matter. i brought this up mostly wondering if anyone else felt the same
|
![]() |
|
Sickening posted:I just want simulated phishing to go away entirely. I don't want my staff to waste the mouse clicks in settings it up. User education seems to be less valuable every year. If the tech doesn't work, users aren't going to save you. Our field trials ended up in zero deploys since we had absolute certainty that, no matter how many times our users got pranked, they would never learn to check the indicators for a phish mail. One of our users cryptolocked us three times in the same fiscal quarter and nothing was done about it, not even a stern email, so we have zero hopes on that front.
|
![]() |
|
hacking into the worldwide jacuzzi networkquote:The login works by sending the username and password to Auth0. On success, access and ID tokens are returned. The access token is then sent to Auth0’s /userinfo endpoint and this information is returned: lol infernal machines fucked around with this message at 00:33 on Jun 22, 2022 |
![]() |
|
jesus christ
|
![]() |
|
Not a single use of "hackuzzi". Disgraceful.
|
![]() |
|
user@hot-tub-crime-machine$ hack-all-jacuzzis
|
![]() |
|
isCool()
|
![]() |
|
returned "false"
|
![]() |
|
that's hott
|
![]() |
|
Shame Boy posted:our new CISO is currently sending out emails demanding everyone download and install this software Shaggar posted:most emails should be ignored SlowBloke posted:One of our users cryptolocked us three times in the same fiscal quarter and nothing was done about it Ulf fucked around with this message at 02:37 on Jun 22, 2022 |
![]() |
|
hackers can turn your Jacuzzi into a deep fryer!!!
|
![]() |
|
~Coxy posted:hackers can turn your Jacuzzi into a deep fryer!!!
|
![]() |
|
Ulf posted:you should report this suspicious email via your mail client's "phish" button i did and instead of answering me directly he replied all to the original email to assure us it was not a phishing attempt, which is definitely not something a phishing attempt would do, so i'm satisfied
|
![]() |
|
[NOT A SCAM] Please read: Important Instructions Attached
|
![]() |
|
Shame Boy posted:i did and instead of answering me directly he replied all to the original email to assure us it was not a phishing attempt, which is definitely not something a phishing attempt would do, so i'm satisfied definitely sounds like something someone with unauthorized access to their account would do, so you better report it again just in case
|
![]() |
|
lol the NTSB's SSL cert expired so I can't get to ntsb.gov and read my boring dry accident reports it's a letsencrypt cert too so there's really no excuse
|
![]() |
|
certbotch
|
![]() |
|
last company required us to print out our phishing training certificates and hang them up. Naturally the site that the training redirected you to was some unaffiliated third party which asked you for your full proper name for the cert anyway my coworker had his up for years pre:--------------------------------- | This certifies that | | BY TYPING NY NAME HERE I MAY BECOME A VICTIM OF PHISHING | has completed all | | required training. | ---------------------------------
|
![]() |
|
Volmarias posted:Luv2get emails for mandatory security training in an email I would 100% mash the "phishing" button on because they ended up being the lowest bidder or whatever other absurd rationale made them the choice. we got a nag mail about filling out some external workplace health survey which offered prizes and it looked exactly like phishing: * Asks you to go to an external link * Sense of urgency * Offers rewards I ignored it but a colleague reported it and got a response of "this looks like mass business spam mail, thanks for reporting it". it was sent by IT management lmao
|
![]() |
|
Shame Boy posted:lol the NTSB's SSL cert expired so I can't get to ntsb.gov and read my boring dry accident reports type `thisisunsafe` into chrome when this happens and it'll ignore cert errors and proceed
|
![]() |
|
Jonny 290 posted:type `thisisunsafe` into chrome when this happens and it'll ignore cert errors and proceed does that bypass HSTS too cuz they had that enabled
|
![]() |
|
Jonny 290 posted:type `thisisunsafe` into chrome when this happens and it'll ignore cert errors and proceed sometimes I wish all these warnings could be configured for ridiculous degenerate cases for instance, I setup a linux pc for loading some customers’ router firmware at the end of an assembly process. this involved plugging directly in to the PC and sending a series of commands to the default IP address. by default ssh will throw a fit if you connect to the same IP address and it’s a different fingerprint, refusing to connect. as I bypassed all the security for passwords, certificates and fingerprints I thought “I just need an opposite mode” - if the username/password wasn’t admin/admin, the certificate was signed or the fingerprint matched somebody hosed up and is programming the same gateway again!
|
![]() |
|
Shame Boy posted:does that bypass HSTS too cuz they had that enabled yep it used to be "badidea" and then too many people started using it and they had to change it to "thisisunsafe" lol
|
![]() |
|
I wish SSL cert warnings didn't exist by spec if you are connecting to RFC1918 space and whoever said privacy is pointless without authentication can eat my whole rear end.
|
![]() |
|
what a terrible idea
|
![]() |
|
![]()
|
# ? Jun 5, 2023 13:39 |
|
spankmeister posted:what a terrible idea
|
![]() |