I'm honestly impressed. It's an interesting situation where the companies can only verify the same information that the hackers have access to
This would not be an issue if RFC 1480 had been taken seriously.
What am I missing? Not doing this is negligent. Same advice we'd give to phishing targets.
ro_bit•1h ago
How do companies decide which EDRs to fulfill and which ones require a judicial subpoena? Are companies ever even under the obligation to fulfill an EDR?
tdeck•1h ago
https://www.texasstandard.org/stories/flock-safety-cameras-h...
> So in a lot of the searches that we reviewed, we had about 500,000 to take a look at. We found the word “investigation” – or variations of the word “investigation” – or “suspect” a lot with really no details about what the investigation pertained to or what the suspect may have done.
> A lot of searches also just listed gibberish, like “ASDF” – that’s the sequence of letters in the center row of your computer keyboard. Or just said that they were there for random checks. We even found a search that just said “donut” or that didn’t say anything at all.