Weld Pond | Chris Wysopal Profile Banner
Weld Pond | Chris Wysopal Profile
Weld Pond | Chris Wysopal

@WeldPond

Followers
56,687
Following
1,029
Media
1,537
Statuses
29,590

Hacker. Co-founder/CTO Veracode. Former L0pht security researcher. GenAI Auto-repair of vulns is the future @weld @infosec .exchange

Boston, MA
Joined March 2008
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@WeldPond
Weld Pond | Chris Wysopal
5 years
So the Secret Service stuck Zhang's thumbdrive into their computer.
Tweet media one
1K
5K
12K
@WeldPond
Weld Pond | Chris Wysopal
3 years
What are all the people who used "Sign in with Facebook" doing now?
112
563
3K
@WeldPond
Weld Pond | Chris Wysopal
11 months
We've lost a true pioneer of the digital world, Kevin Mitnick. His ingenuity challenged systems, incited dialogues, and pushed boundaries in cybersecurity. He will remain a testament to the uncharted power of curiosity. #RIPKevinMitnick
Tweet media one
80
857
3K
@WeldPond
Weld Pond | Chris Wysopal
5 years
. @sifutweety pointed out that the fact that this is getting so many retweets is a credit to infosec education -- everyone knows this is a stupid idea.
48
176
2K
@WeldPond
Weld Pond | Chris Wysopal
4 years
Does anyone want to share 15% of their password?
331
259
2K
@WeldPond
Weld Pond | Chris Wysopal
6 months
"There are nearly 600K unfilled cybersecurity jobs in the U.S. right now, and about 3.5M open roles globally, says Lisa Gevelber, Google’s chief marketing officer for the Americas" This is because all the openings are entry level positions requiring 5 yrs experience.
85
257
2K
@WeldPond
Weld Pond | Chris Wysopal
2 years
Log4j 2.16.0 is out and completely disables JNDI by default.
17
766
2K
@WeldPond
Weld Pond | Chris Wysopal
2 years
Current status: Sorry, I’ll have to get back to you. I’m dealing with an open source issue.
Tweet media one
49
244
2K
@WeldPond
Weld Pond | Chris Wysopal
2 years
"Password expiration requirements do more harm than good, because these requirements make users select predictable passwords" Thank you Microsoft. NIST agrees. Everyone who attacks password auth agrees. Can we get compliance to update their requirements.
35
496
2K
@WeldPond
Weld Pond | Chris Wysopal
3 years
My son me asked for some fidget toys.
Tweet media one
30
80
1K
@WeldPond
Weld Pond | Chris Wysopal
5 years
Ah, the good old days.
Tweet media one
16
336
1K
@WeldPond
Weld Pond | Chris Wysopal
2 months
House passes Protecting Americans’ Data from Foreign Adversaries Act, H.R. 7520
Tweet media one
17
281
1K
@WeldPond
Weld Pond | Chris Wysopal
3 years
An infrastructure bill should include funding for cybersecurity. The internet is critical infrastructure for public and private realms in the 21st century.
24
167
1K
@WeldPond
Weld Pond | Chris Wysopal
2 years
Tweet media one
12
154
1K
@WeldPond
Weld Pond | Chris Wysopal
7 years
No government helped WannaCry victims. It was independent security researchers who found & used the kill switch, and built a decryption tool
31
696
1K
@WeldPond
Weld Pond | Chris Wysopal
3 years
3.5" floppy disks may be obsolete but their ghosts live on in cyberspace as little save button outlines
34
143
939
@WeldPond
Weld Pond | Chris Wysopal
6 years
I'd rather hire someone who knew how to use netcat than someone who thinks one of these answers is correct.
65
281
927
@WeldPond
Weld Pond | Chris Wysopal
9 years
Universal asks Google to take down 127.0.0.1 for piracy. See claim #2
76
2K
912
@WeldPond
Weld Pond | Chris Wysopal
6 years
20 years ago today 7 hackers from the L0pht testified about cyber security on Capitol Hill. @spacerog @joegrand @WeldPond & @dotMudge will return on 5/22/18 to discuss what has improved what hasn’t.
Tweet media one
28
464
899
@WeldPond
Weld Pond | Chris Wysopal
2 years
The patched version of log4j 2.15.0 requires a minimum of Java 8. If you are on Java 7 you will need to upgrade to Java8 When there is active exploitation and you need to patch fast it is beneficial if you have been updating your other dependencies over time.
13
238
868
@WeldPond
Weld Pond | Chris Wysopal
3 years
#protip If your lawyer, doctor, or therapist has an Amazon Echo or other voice device in their office, tell them they need to remove it or you will be taking your business elsewhere.
21
161
849
@WeldPond
Weld Pond | Chris Wysopal
2 years
The cryptocurrency ecosystem requires a lot of “trusting people not to write bugs.”
Tweet media one
40
276
836
@WeldPond
Weld Pond | Chris Wysopal
5 years
OMG all 3 teams got this wrong in @defcon hacker jeopardy. Answers were 21, 22, and 25.
Tweet media one
141
137
799
@WeldPond
Weld Pond | Chris Wysopal
2 years
For Apache Log4j remediation priority it seems the best approach right now is: 1. log4j 2.x through 2.14 - update to 2.16 2. log4j 1.x - update to 2.16 3. log4j 2.15 - update to 2.16
30
192
793
@WeldPond
Weld Pond | Chris Wysopal
3 years
Tonight Pres. Biden mentioned cybersecurity twice. Once as a career a student can learn at a community college (potentially for free) and once as an example of a global challenge where the U.S. can’t go it alone. This bodes well for a more secure digital world.
12
115
765
@WeldPond
Weld Pond | Chris Wysopal
3 years
Put on guest network. Tape over camera. Snip wire on internal mic. I'm available for additional White House IoT security consulting.
16
80
771
@WeldPond
Weld Pond | Chris Wysopal
2 years
Korean researchers have developed a set of attacks against some solid-state drives (SSDs) that could allow planting malware in a location that's beyond the reach of the user and security solutions.
21
298
749
@WeldPond
Weld Pond | Chris Wysopal
3 years
"We [Facebook] also describe our in-house BGP software implementation, and its testing and deployment pipelines. These allow us to treat BGP like any other software component, enabling fast incremental updates."
19
186
753
@WeldPond
Weld Pond | Chris Wysopal
6 years
The new hacker economics.
Tweet media one
7
339
704
@WeldPond
Weld Pond | Chris Wysopal
5 years
Zoom video conferencing zero day patch now available.
Tweet media one
11
204
721
@WeldPond
Weld Pond | Chris Wysopal
5 years
Going through TSA tonight I got randomly flagged for an electronics inspection. Seeing the stickers on my laptop the agent asked if this was my college laptop. I didn’t have the guts to tell him they didn’t have laptops when I graduated college.
29
54
719
@WeldPond
Weld Pond | Chris Wysopal
4 years
Like if you wrote software that had menus like this.
Tweet media one
55
41
695
@WeldPond
Weld Pond | Chris Wysopal
5 years
“But the [Luxor] beam has also become a magnet for grasshoppers, which experts say could linger in Las Vegas for weeks.” The Luxor is next to the Black Hat conference hotel. This is not the bug bounty I was expecting.
26
200
681
@WeldPond
Weld Pond | Chris Wysopal
3 years
I first learned hacking from underground BBSs. Banning demos/info from mainstream services will harm security. One of my earliest hacker lessons is all cybersecurity info is dual use. Let's stop pretending learning about attacks is harmful.
24
193
667
@WeldPond
Weld Pond | Chris Wysopal
1 year
@Cobylefko Boston’s North End
Tweet media one
23
8
647
@WeldPond
Weld Pond | Chris Wysopal
2 years
Not the best way to open an email to a security person. "Chris, I would like to introduce you to XXXX, the premier global solution for non-hackable, completely secure and authentic long term data storage."
68
26
564
@WeldPond
Weld Pond | Chris Wysopal
3 years
My parrot and I are enjoying an early Christmas present. ⁦ @EffinBirds
Tweet media one
18
15
571
@WeldPond
Weld Pond | Chris Wysopal
8 years
If Trump is soliciting Russian hackers to find Hillary's missing emails isn't he taking away jobs from hard-working Americans hackers?
20
330
532
@WeldPond
Weld Pond | Chris Wysopal
4 years
We’re going to start seeing a lot of these signs.
Tweet media one
10
184
515
@WeldPond
Weld Pond | Chris Wysopal
4 years
Singapore launches cyber security label for smart home devices.
Tweet media one
11
204
518
@WeldPond
Weld Pond | Chris Wysopal
4 years
What a crypto backdoor looks like. NSA Backdoor Key from Lotus-Notes
10
238
473
@WeldPond
Weld Pond | Chris Wysopal
5 years
On Sunday, it will be 25 years since day was registered. was a homebrew 486 33MHz running a Slackware distribution of Linux 1.0 on a 28.8K dialup line to . The machine also ran mail and routed our class C.
Tweet media one
13
95
462
@WeldPond
Weld Pond | Chris Wysopal
3 years
This is a good time to reconsider giving yet more usage information to data aggregators like Facebook by using their sign in with feature.
5
69
438
@WeldPond
Weld Pond | Chris Wysopal
2 years
With @cisagov 's recent advisory on Russia, the question on the cover of Time from 1995 seems more apropos as ever
Tweet media one
20
122
423
@WeldPond
Weld Pond | Chris Wysopal
5 years
We are entering the era of forever vulnerable hardware. D-Link router with CVSS 10.0 vuln won't get a patch because it is EOL.
32
243
407
@WeldPond
Weld Pond | Chris Wysopal
5 years
Leaving Tokyo now and I have to say it is the most cyberpunk city I have visited.
11
144
392
@WeldPond
Weld Pond | Chris Wysopal
4 years
Tweet media one
4
107
384
@WeldPond
Weld Pond | Chris Wysopal
2 years
OH from some 90's hackers: "I hacked NASA" is straight up there with "I had a newspaper route"
21
34
381
@WeldPond
Weld Pond | Chris Wysopal
3 years
27 year old invoice for ⁦ @L0phtHeavyInd ⁩ 56 kbps dedicated line which ran our website and gave our LAN internet access. We eventually stepped up to 128 kbps ISDN as we sold more shell accounts, t-shirts and archive CDs.
Tweet media one
25
34
387
@WeldPond
Weld Pond | Chris Wysopal
2 years
Log4j 2.17.0 is out and protects against infinite recursion DoS. CVSS 7.5
@WeldPond
Weld Pond | Chris Wysopal
2 years
Log4j 2.16.0 is out and completely disables JNDI by default.
17
766
2K
15
171
377
@WeldPond
Weld Pond | Chris Wysopal
5 years
90’s hacker groups are having a moment 20 years later. #CultoftheDeadCow
14
38
374
@WeldPond
Weld Pond | Chris Wysopal
4 years
Imagine if election security hadn't improved in the last 4 years and instead of the current 95% paper ballots we were back at 82% like in 2016. Our democracy depends on secure elections. Thank you to all the patriots who defended and continue to defend our elections.
7
30
348
@WeldPond
Weld Pond | Chris Wysopal
6 years
The Senate Cyber caucus had a surprise for me when I came to speak today
Tweet media one
18
58
356
@WeldPond
Weld Pond | Chris Wysopal
5 years
Following a serious vulnerability disclosure affecting casinos globally, an executive of casino technology vendor Atrient has assaulted the security researcher who disclosed the vulnerability at the ICE conference in London.
18
243
325
@WeldPond
Weld Pond | Chris Wysopal
1 year
Today is the 25th anniversary of my testimony to the U.S. Senate as part of a group of 7 hackers from the L0pht. The hearings were titled, "Weak Computer Security in Government: Is the Public at Risk?" (cont)
Tweet media one
6
64
323
@WeldPond
Weld Pond | Chris Wysopal
4 years
Put your VPN exit node in another country.
20
170
320
@WeldPond
Weld Pond | Chris Wysopal
6 years
Before and after #L0pht20
Tweet media one
10
65
319
@WeldPond
Weld Pond | Chris Wysopal
8 years
I'm happy to see secure network shell access promoted.
Tweet media one
7
228
305
@WeldPond
Weld Pond | Chris Wysopal
2 years
What was the very first cybersecurity task you remember doing? For me it was turning off services in /etc/inetd.conf to harden a default Linux install.
184
21
311
@WeldPond
Weld Pond | Chris Wysopal
5 years
My son graduated today from the U of Oregon with a degree in music performance and I couldn't be happier. 🎺
24
0
310
@WeldPond
Weld Pond | Chris Wysopal
2 years
Looks like they gave this poor guy all the workstations for all of the still open positions.
19
43
305
@WeldPond
Weld Pond | Chris Wysopal
6 years
Just saw a baby in a stroller @defcon with a tinfoil hat.
9
29
303
@WeldPond
Weld Pond | Chris Wysopal
3 years
How much is my PiHole is costing them? Can simple network blocking evaporate 10s of $billions? Is it really this easy to gain privacy and destroy value.
@PatrickMcGee_
Patrick McGee
3 years
*New*: @Apple ’s privacy settings caused an estimated $9.85bn of revenues to evaporate in the second half of this year at @Snap , @Facebook , @Twitter and @YouTube , as their advertising businesses were shaken by the new rules Average impact on revenue: -12% *Thread*
Tweet media one
39
416
2K
11
59
305
@WeldPond
Weld Pond | Chris Wysopal
1 year
There will be an AI Village at @defcon and many AI players (Anthropic, Google, Hugging Face, Microsoft, NVIDIA, OpenAI and Stability AI) are bringing their models to be hacked.
Tweet media one
7
74
297
@WeldPond
Weld Pond | Chris Wysopal
5 years
Hey U.S. govt. look here! "The Swiss government has issued a 150,000 Swiss franc (US$149,790) challenge to online hackers; break into our new generation electronic voting system and we'll reward you."
12
174
284
@WeldPond
Weld Pond | Chris Wysopal
2 years
ProTip: looking for a way to bypass NAC when you are on premises? Find an unused docking station that has ethernet. Its MAC is already approved.
11
38
298
@WeldPond
Weld Pond | Chris Wysopal
5 years
Does everyone with a stickie or cover over their Mac camera feel more justified tonight?
Tweet media one
47
65
283
@WeldPond
Weld Pond | Chris Wysopal
1 year
"Computer scientists from Stanford University have found that programmers who accept help from AI tools like Github Copilot produce less secure code than those who fly solo." Looks like there will be a market for AI vuln remediation!
13
84
281
@WeldPond
Weld Pond | Chris Wysopal
3 years
The Colonial Pipeline shutdown is a good example of why we need a CyberNTSB. If a criminal group can shut down 45% of the east coast's fuel supply we all have a right to know how this happened and how it should be prevented.
15
59
280
@WeldPond
Weld Pond | Chris Wysopal
5 years
A response to ISIS required a new kind of warfare, and so the NSA and U.S. Cyber Command created a secret task force, a special mission, and an operation that would become one of the largest and longest offensive cyber operations in U.S. military history.
12
142
275
@WeldPond
Weld Pond | Chris Wysopal
6 years
Yes those 1981 Hayes Modem Command set AT commands. "including the ability to enable USB debugging, bypass Android security controls, exfiltrate sensitive information, perform screen unlocks, reflash device firmware, and inject touch events solely through the use of AT commands."
@BlackHatEvents
Black Hat
6 years
Vulnerabilities in #Android security controls accessible via the AT command interface #BHUSA Briefing by Grant Hernandez ( @digital_cold )
3
33
60
21
165
274
@WeldPond
Weld Pond | Chris Wysopal
7 years
Who remembers when technical knowledge was disseminated this way?
Tweet media one
30
44
267
@WeldPond
Weld Pond | Chris Wysopal
3 years
Seems my son had a little fun with my keyboard last night.
Tweet media one
22
10
257
@WeldPond
Weld Pond | Chris Wysopal
5 years
Please join me in congratulating @chriseng for his new title as @Veracode 's Chief Research Officer!
Tweet media one
36
19
260
@WeldPond
Weld Pond | Chris Wysopal
3 years
Calling something unhackable is the best thing you can do if you want lots of testers.
17
47
252
@WeldPond
Weld Pond | Chris Wysopal
2 years
Who remembers reading newspaper articles on microfiche? We had a portable unit at the L0pht bought at the MIT flea market. Then we found DEC manuals on microfiche. Such cool tech.
25
10
258
@WeldPond
Weld Pond | Chris Wysopal
5 years
I don't think naming your vulnerability after a popular security tool is a good idea. Have these researchers never heard of netcat?
19
93
251
@WeldPond
Weld Pond | Chris Wysopal
5 years
The NSA, yes the NSA, is urging people to patch.
14
190
248
@WeldPond
Weld Pond | Chris Wysopal
5 years
A 20th anniversary viewing will be as fun as the 1st time.
Tweet media one
16
33
248
@WeldPond
Weld Pond | Chris Wysopal
3 years
I see the following advice over and over. Enable 2FA for any sensitive accounts I don't think people understand how difficult and expensive this is to do (and enforce) across any business with thousands of employees and 100+ SaaS applications.
42
36
249
@WeldPond
Weld Pond | Chris Wysopal
5 years
Cisco patches router flaw by banning Curl user agents. Netcat FTW!
@RedTeamPT
RedTeam Pentesting
5 years
@info_dox @TheHackerNews @bad_packets @hrbrmstr We were also quite surprised to find this /etc/nginx.conf in 1.4.2.20
Tweet media one
48
417
1K
7
114
236
@WeldPond
Weld Pond | Chris Wysopal
10 months
Don't fear the tool. Fear the vulns. Police are alerting on @flipper_zero 's potential for bypassing access control systems. I wouldn't call it a bypass. These are systems *missing* access control and relying on solely security by obscurity.
Tweet media one
12
78
236
@WeldPond
Weld Pond | Chris Wysopal
2 years
Re: log4j 2.17.1. Wherever RCE or “arbitrary code execution” is mentioned it needs to be qualified with “where an attacker with permission to modify the logging configuration file” or you are overhyping this vuln. This is how you ruin relationships with dev teams.
@Swati_THN
Swati Khandelwal
2 years
Apache has released an update for #Log4j to address a newly discovered arbitrary code execution #vulnerability , making it the 5th security flaw discovered in the span of a month. Read details: #infosec #cybersecurity #hacking
3
17
11
13
50
237
@WeldPond
Weld Pond | Chris Wysopal
3 years
Dogecoin can to trick or treat. #halloween @aabelak
Tweet media one
5
14
226
@WeldPond
Weld Pond | Chris Wysopal
5 years
“the Zoom app apparently installs a web server on Macs that accepts requests regular browsers wouldn’t. In fact, if you uninstall Zoom that web server persists and can reinstall Zoom without your intervention.”
9
173
215