Brian in Pittsburgh
@arekfurt
Former attorney, current IT & infosec consultant in the 'Burgh. Happy to talk about password spraying one minute and constitutional law the next. Son of #wvu.
IMHO, a vital yet underappreciated thing about risk: Almost every serious security, safety, or reliability incident involves a major mismatch between the amounts of unmitigated risk an org: -thought it was accepting -represented to others it was accepting -was actually accepting
New blog post! 📰 Microsoft Remote Desktop (MSRDC) is going away 😱 — and recent updates broke MsRdpEx support. Learn how to pin a stable version, disable auto-updates, and save it while you still can! ☀️💻👇 awakecoding.com/posts/saving-m…
I'd certainly assume there are already people trying to arrange the release of this fellow and perhaps other arbitrarily held Americans in exchange for the U.S. letting the Chinese APT hacker arrested recently in Italy go home. And it will probably happen. cnn.com/2025/07/21/bus…
It's very simple: We aren't yet serious about critical infrastructure cybersecurity. The political will isn't there. The real questions: 1. Is there any chance we'll get serious before something pretty horrible happens? 2. If we don't, how bad will that horrible thing be?
What is happening re: Salt Typhoon? It's a gawdamn national embarrassment. US Government: Hey phones are pwned. It's China. citizens: you're fixing it right? Telcos: pweeze dis is so hawd. 🥺👉👈 This is NOT how a serious nation responds to such an incursion.
I kid you not, I was at a conference (for IT leaders... CISOs, Directors, etc) one speaker on a panel: move to Azure AD, it's secure by default other speaker: yes, it's way better Not. One. Person. On. The. Panel. Objected. I raised my hand to complain, but nobody called on me
And then they want to move to Entra. With the same broken fucking processes that led to AD being a mess.
This exploitation activity, publicly reported as “ToolShell,” provides unauthenticated access to systems and enables malicious actors to fully access SharePoint content. Take action now 👉 go.dhs.gov/iZZ
Malicious actors are exploiting RCE vulnerability CVE-2025-53770 to compromise on-prem SharePoint servers. See our Alert for info & mitigations on exploitation activity, known as #ToolShell. 👉go.dhs.gov/iZZ
At this hour, patches for SharePoint subscription edition and SharePoint 2019 are now available. If you use SharePoint 2016 I would expect that a patch for that could drop at any time and be ready to rapidly push it through expedited update proceedures. msrc.microsoft.com/blog/2025/07/c…