Sparkega

joined 1 year ago
[–] [email protected] 4 points 7 months ago (1 children)

I’ll give you a piece of my mind.

Just kidding. Thanks for the correction

[–] [email protected] 63 points 7 months ago (4 children)

Eliminates a malicious threat vector. Gives you piece of mind to charge your devices without worry that what you connect to is going to interact with your device.

[–] [email protected] 4 points 7 months ago

Give Swindon a chance.

[–] [email protected] 1 points 10 months ago

Thanks for the recommendations! The only one I don't have already is Slime Rancher, which was 75% off!

[–] [email protected] 5 points 10 months ago

That's probably more accurate.

[–] [email protected] 5 points 10 months ago (8 children)

Any recommendations?

[–] [email protected] 0 points 10 months ago (2 children)

That's good but I still don't believe it.

[–] [email protected] 2 points 11 months ago (1 children)

Which game is that? The only one that came to mind was American McGee's Alice but that's a third person shooter.

[–] [email protected] 12 points 1 year ago (1 children)

I experienced an instant game over a couple hours in on my first playthrough on the crashed nautiloid. When I found the wounded mind flayer, I tried to peer into his mind and failed the roll leading to him overpowering me. I became a thrall while Asterion and Shadowheart watched. No option to revive during the cutscene.

[–] [email protected] 21 points 1 year ago

I'm 2+1 and tested positive for COVID last week. Immunity wanes.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

I hope you're right that it does phase out. Here is evidence that having cyber insurance makes you more of a target.

DS: Do your operators target organizations that have cyber insurance?

UNK: Yes, this is one of the tastiest morsels. Especially to hack the insurers first—to get their customer base and work in a targeted way from there. And after you go through the list, then hit the insurer themselves.

Interview

 

Researchers analyzed 190 million hacking events on a honeynet and categorized the types of hackers into Dungeons and Dragons classses.

Rangers evaluate the system and set conditions for a follow-on attack.

Thieves install cryptominers and other profiteering software.

Barbarians attempt to brute force their way into adjacent systems.

Wizards connect the newly compromised system to a previous to establish 'portals' to tunnel through to obscure their identity.

Bards have no apparent hacking skill and likely purchase or otherwise acquired access. They perform basic computer tasks.

view more: next ›