frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

What It Takes to Defend a Cybersecurity Company from Today's Adversaries

https://www.sentinelone.com/labs/top-tier-target-what-it-takes-to-defend-a-cybersecurity-company-from-todays-adversaries/
176•gnabgib•9mo ago

Comments

CyberMacGyver•9mo ago
It’s RSA time so expect lot of cybersecurity posts
owyn•9mo ago
I haven't heard of that one. What is RSA time?
ash-ali•9mo ago
RSA conference in the city
mandevil•9mo ago
2025 RSA Conference USA in San Francisco. So lots of papers are going to be presented and talks given on new clever ways researchers have figured out to beat different layers of security, tracking APT's, etc.

https://www.rsaconference.com/usa

keyle•9mo ago
That sounds like the oracle version of defcon.
hiddencost•9mo ago
That's kinda cruel. RSA is trying to do a good job, and takes their customers safety quite seriously.

(Kidding. A little.)

imiric•9mo ago
I hope you're entirely kidding with that statement.

RSA was famously bribed by the NSA to make their compromised PRNG the default in their cryptography library, which shipped from 2004 to 2013. Any credibility they might've had vanished after that was publicized in the Snowden leaks.

h4ck_th3_pl4n3t•9mo ago
I laughed more at that one that I should have.

Kudos, made my day

saagarjha•9mo ago
Ah, that’s why all the people in business attire are swarming around
hulitu•9mo ago
> Recent adversaries have included: DPRK IT workers posing as job applicants ransomware operators probing for ways to access/abuse our platform Chinese state-sponsored actors targeting organizations aligned with our business and customer base

Thank god there were no Russians or Iranians. /s

bigfatkitten•9mo ago
Iranians have been doing it too, on an individual, sanctions-evading level rather than as a state-sponsored mission.

Many of the DPRK workers operate out of Russia (and China.)

looperhacks•9mo ago
Is there any way to recognize adversary IT workers? Not many companies have the capabilities of cybersecurity experts
Animats•9mo ago
Start with a fingerprint check before you even talk to them.[1] Then ask for a REAL ID at the interview, take fingerprints again, and match with the ones from the pre-screen fingerprint check. You need to be signed up with a driver's license verification service to validate the ID.[2]

It takes that level of verification to become a security guard or a school bus driver. Anybody in computer security should be doing this.

[1] https://www.sterlingcheck.com/services/fingerprinting/

[2] https://www.aamva.org/technology/systems/verification-system...

Gathering6678•9mo ago
Are you serious about this?

I live in China, a supposedly autocratic country and one with universal ID, and even companies here don't take fingerprints. ID will be shown when you are officially onboard. I can't say for all, but for most companies (at least the ones without the need for a security clearance), requiring ID at interview will be seen as a red flag, and requiring fingerprint would probably be put on social media and name shamed, if not straight up reported to the authorities.

mixmastamyk•9mo ago
Not a typical job but one in a high security environment, seems somewhat understandable.

Not that I’d do it. The paradox that security for a firm means zero privacy for me is too much to bear these days.

Gathering6678•9mo ago
I have some experience working for financial institutions with access to highly confidential information, and haven't been required to produce my fingerprint for, like, ever.

Again, I can't say for all, and I'm sure there are certain companies and positions which require such measures, but I could not imagine requiring fingerprints (or even ID during interview) to be acceptable in most cases.

Spooky23•9mo ago
You probably worked in divisions where the auditors didn’t issue a finding yet, or outside the regulatory scope.

It’s pretty common in finance, government and human services. Amazon is very aggressive with this - contractors in their facilities get regular background checks.

Usually the employee goes to a third party run by a company like Idemia to collect the biometric. I can’t imagine not collecting the ID information of perspective employees - that’s just asking for fraud.

hiatus•9mo ago
You didn't have to do an in-person background check that included fingerprinting? When I worked at a bank this was required. It was run by a third party company not at the office.
Gathering6678•9mo ago
No, but I didn't deal with money directly. I dealt with corporate governance and capital market related information for the company, so perhaps other people needed to have their fingerprints taken.
Cthulhu_•9mo ago
In a high security environment, you can get a report from law enforcement; in the Netherlands this is called a "declaration around behaviour" (??), which is basically a signed / authenticated document saying "this person was not involved in financial crimes" - you need to have it specified for a category of crimes, the previous is for example one I had to get to work at a bank as a contractor.

I don't know what the equivalent in the US is, but https://www.fbi.gov/how-we-can-help-you/more-fbi-services-an... seems similar enough.

I'd trust an FBI report more than taking their fingerprints and the like.

Animats•9mo ago
The way it worked for a real US high security job (TS/SCI) was that the clearance process was totally separate from the employer. The fingerprints and polygraph exams were done off premises. The famous SF-86 form[1], all 130 pages, had to be filled out, but nobody at the employer ever saw it. The checking and processing were done by the FBI or a unit in DoD.

(The current SF-86 only wants your residence addresses for the last 10 years. Used to be "List all residences from birth".)

[1] https://www.opm.gov/forms/pdf_fill/sf86.pdf

Animats•9mo ago
If you're under attack by a foreign government, this isn't optional.
philipallstar•9mo ago
> I live in China, a supposedly autocratic country and one with universal ID, and even companies here don't take fingerprints. ID will be shown when you are officially onboard. I can't say for all, but for most companies (at least the ones without the need for a security clearance), requiring ID at interview will be seen as a red flag, and requiring fingerprint would probably be put on social media and name shamed, if not straight up reported to the authorities.

You're in a much more authoritarian country, and that would be using your non-universal, national ID. How do you authenticate someone coming in from overseas?

Answer: your authoritarian government doesn't let them in, or authenticates them for you in a joint process with your HR department.

Gathering6678•9mo ago
For overseas workers, a. it is quite difficult for foreigners to get a working visa in China (though I suppose it's more of an immigration issue rather than the country being authoritarian); b. companies would probably use their passports. So you're kind of correct. However, my point still holds: fingerprints for interviewees, even in China, is at best extremely uncommon, and at worst (?) illegal in most cases.

Btw, I am nitpicking here, but by universal I meant used across the whole country, i.e. national.

recursivecaveat•9mo ago
Biggest thing you can do is just ensure you conduct at least 1 on-site interview, and make sure that interviewer is in a position to realize if the person they met is not the same one who shows up for other interviews and/or the work. Cost of a flight is nothing really compared to recruiting and hiring (and if you really are fully-remote and geographically distributed, you probably already have somebody in their metro area), on-sites used to be standard.
khafra•9mo ago
I mean, it's not the biggest thing you can do; you could start selling to the government, become a cleared contractor, and then you could require a USG security clearance for job applicants.

I would call the on-site interview and/or minimal background check "the most pareto frontier thing you can do."

Mountain_Skies•9mo ago
How much of that would you get from just using e-verify? That doesn't find criminal issues like a security clearance does but seems like it would at least reduce the pool of nefarious applicants by a significant margin.
smolder•9mo ago
The reality is a bunch of people trying to secure their insurance relationship. Useless money absorbers are running things.
CyberMacGyver•9mo ago
Yes there are lot of identifiers. They are improving a lot, so things are changing daily. There are certain steps to take pre hiring and post hiring. If you need help share your email and I can provide details.
bigfatkitten•9mo ago
Just make them show up in person at least once for onboarding. They're not going to fly out from China or Russia (where they tend to be based) to do this; especially not to the US.

Verify their ID in person, issue their laptop etc in person, make sure someone who interviewed them is there to meet and greet them (and attest that it's the same person they talked to.)

If you can at least do a final interview in person also, then that's even better.

Cthulhu_•9mo ago
Definitely the 'regular' application procedures - check someone's ID, check their references, ideally meet them face to face, etc.

This is more tricky with remote-only jobs or worse, "gigs" where you don't even meet people. But also, I would've expected open source to be "infiltrated" a lot more than it has, since that's very much anonymous internet culture... but also a culture of code reviews and the like.

wlk•9mo ago
Some high-level advice is listed here: https://ofac.treasury.gov/media/923131/download?inline

I run outsourcing agency, we work with US clients and have seen lots of fake applications (different degree of sophistication), so far we have either rejected them right away, or we were able to filter them during (remote) interviews.

lukan•9mo ago
The latest advice about spotting at least north koreans who apply under fake identities is asking them to comment on how fat Kim Jong Un is. Real north koreans could not comment on that..
paulryanrogers•9mo ago
Is this technique used in the real world?
razakel•9mo ago
There's often red flags, such as a Polish name, graduate from a Polish university, but doesn't actually speak Polish.

Local knowledge, too. If they claim to be from Krakow, get someone from there to chat to them. If you hear frantic typing, they're imposters.

betaby•9mo ago
> There's often red flags, such as a Polish name, graduate from a Polish university, but doesn't actually speak Polish.

That's oddly specific. Any famous examples?

af78•9mo ago
Famous, I don't know, but one example comes to mind:

https://www.bellingcat.com/news/americas/2022/06/16/the-braz... The Brazilian Candidate: The Studious Cover Identity of an Alleged Russian Spy

Maybe also Pablo González Yagüe aka Pavel Alekseyevich Rubtsov.

torton•9mo ago
Might have been a retelling of https://newsletter.pragmaticengineer.com/p/ai-fakers, which is only about two months old.

> "The candidate did not speak Serbian, despite graduating from the University of Kragujevac, in Serbia."

leoqa•9mo ago
The solution is just-in-time access controls, context-aware authorization for things like database access (i.e. given a justification with an approval workflow, the employee can access a user X for 2 hours). These are the guard rails against a rogue employee, by introducing friction.

I rolled out these level of controls at a big company and got push back from the sales team -- they needed access to generate leads. do demos on the spot, etc. Was a hard fight and I lost.

ta1243•9mo ago
Young naive and full of memes, parachuted into place from a billionaire, completely unaccountable and completely unaware of how todo anything securely.
dubbel•9mo ago
Heh, given the title I initially thought SentinelOne was addressing the Chris Krebs situation, and the adversary would be the current administration. But it's about different nation state actors.

(context: https://www.cnbc.com/2025/04/16/former-cisa-chief-krebs-leav... )

croes•9mo ago
Don’t expect that much courage
jillyboel•9mo ago
In Article III, Section 3 of the United States Constitution, treason is specifically limited to levying war against the U.S., or adhering to their enemies, giving them aid and comfort.

Under U.S. Code Title 18, the penalty is death, or not less than five years' imprisonment (with a minimum fine of $10,000, if not sentenced to death). Any person convicted of treason against the United States also forfeits the right to hold public office in the United States.

Retric•9mo ago
The constitution sets a really high bar on Treason. “It was not enough, Chief Justice John Marshall’s opinion emphasized, merely to conspire “to subvert by force the government of our country” by recruiting troops, procuring maps, and drawing up plans. Conspiring to levy war was distinct from actually levying war.” https://constitutioncenter.org/the-constitution/articles/art...

“No person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.”

Cramer v United States being an interesting example. ‘As the Court explained: “A citizen intellectually or emotionally may favor the enemy and harbor sympathies or convictions disloyal to this country’s policy or interest, but, so long as he commits no act of aid and comfort to the enemy, there is no treason. On the other hand, a citizen may take actions which do aid and comfort the enemy—making a speech critical of the government or opposing its measures, profiteering, striking in defense plants or essential work, and the hundred other things which impair our cohesion and diminish our strength—but if there is no adherence to the enemy in this, if there is no intent to betray, there is no treason.” In other words, the Constitution requires both concrete action and an intent to betray the nation before a citizen can be convicted of treason; expressing traitorous thoughts or intentions alone does not suffice.’

wizardforhire•9mo ago
Those are great words both of you. A lot of good was done with those words and the others that come before and after them. Its too bad they don't matter anymore… I wish they did.
formerphotoj•9mo ago
Agreed. We are now "back" to laws for thee but not for me.
wizardforhire•9mo ago
In the spirit of hn endless pedantry… we’re sadly back to might makes right.
Terr_•9mo ago
> they don't matter

In way that is--ultimately--very real and practical, the words continue to matter while people assert they matter.

It's difficult, but we should avoid crossing from cynicism to defeatism.

wizardforhire•9mo ago
This 100%.

They absolutely matter without a shadow of a doubt.

Which is why the current situation is so frustratingly ridiculous.

dspillett•9mo ago
> The constitution sets a really high bar…

Unfortunately the current DPRUS administration doesn't seem to care what the constitution says. They happily ran over the due process requirements set in the 5th amendment and openly ignored a court ordering something to be done to rectify that.

For the time being at least, any protection “guaranteed” by the constitution can not be relied upon if it goes against the wishes of a certain few.

dspillett•9mo ago
For those downvoting the above: do the comments Trump has made since alter your opinion?
godelski•9mo ago
https://archive.is/aRNSn
firtoz•9mo ago
Wow, so if you don't fall in line with the demagoguery, you'll be thrown out, probably to be replaced with someone who does, or it'll be rinse and repeat until that happens.
nopcode•9mo ago
I haven't seen American cybersecurity companies share meaningful threat intel about any American threat campaigns. This is not new.
mikewarot•9mo ago
You just can't secure something like Windows, Linux, MacOS, because it's faulty by design. Any business that claims to be able to do so is selling snake oil.

Capability based operating systems can be made secure. Data diodes are a proven strategy to allow remote monitoring without the possibility of ingress of control. Between those two tools, you have a chance of useable and secure computing in the modern age, even against advanced threats.

Yeah... I feel like Cassandra, but here we are. You've been warned, yet again.

Cthulhu_•9mo ago
What OSes are you proposing though? You're positing a problem and warning people, but what are the alternative operating systems that implement these data diodes?
mdhb•9mo ago
Google’s in development (contrary to what people on here will tell you) new operating system Fuchsia actually has what seems to be a genuinely defendable architecture.

https://fuchsia.dev/fuchsia-src/concepts/principles/secure

guappa•9mo ago
I expect it to be ready long after GNU/Hurd will be the default system installed on new machines being sold.
sublimefire•9mo ago
hmm but this is not really about it, it is more about how companies can be protected. It talks e.g. about shadow IT workers trying to infiltrate into the company.
concerndc1tizen•9mo ago
I agree about data diodes, but how do you handle data egress? One solution is to have strict data checks on egress, but leaks are still possible. Data diodes also still suffer from the ability to inject malware that can execute DOS attacks.

I agree about capability-based security, but strictly speaking, the capabilities of current OS are just primitive, i.e. checking file permissions. What capability checks do you mean?

My understanding is that the biggest threat is not capability checking, but capability escalation, i.e. bypassing checks, and hardware hacking, e.g. spectre/meltdown-type attacks that can read arbitrary memory.

khaki54•9mo ago
There is a step up from diodes called [inspecting] data guards and an adjacent technology called content disarm and reconstruct (CDR) that doesn't rely on signatures or heuristics - it just assumes every document is malicious.

Combining these 3 technologies with certain policies, e.g. 2 man rule, the hw/sw itself developed on airgap you can make it practically impossible to attack, even for nation state adversaries.

Edit to point out that these all work in 2-way configurations as well.

immibis•9mo ago
This is one of those situations, like with cryptocurrencies or social media, where the old thing had certain problems for pretty fundamental reasons, and the new thing claims it won't have the same problems, but that's just because the new thing is new and hasn't gotten to the point of the problems being discovered yet.

If an operating system can run any program you want, then it can run malware if you want. Windows, Linux and Mac OS are OSes that let you run any program you want. Android and iOS are OSes that restrict which programs you can run. Different techniques end up placing the boundary in different places but they still either limit you from running lots of nonmalware programs or they allow you to run lots of malware.

Operating systems already completely sandbox processes. Then they poke a ton of holes in the airtight hatchway because holes are useful. Suddenly it's not airtight, but at least it's useful. Then someone make a new OS with a holeless airtight hatchway. In time, it too will discover which holes it needs, and won't be airtight.

Something similar happens with data diodes. A reply mentions punching holes in a data diode by allowing certain limited two-way communication. Fine, but then it's not a data diode. And someone will suggest putting a data diode on one side of your not-data-diode to make it airtight again. And you'll have the problems of a data diode again.

kube-system•9mo ago
> You just can't secure something like Windows, Linux, MacOS, because it's faulty by design.

Every system is. Security isn't a goal that is ever 'achieved', it is a continual process of mitigating risk.

mlinksva•9mo ago
I tend to agree though the conventional response I'd guess also has merit: "secure" isn't binary and various mitigations deployed on non-capability-based operating systems change the economics of attack/defense and are valuable.

But the main reason I'm responding is to thank for the TIL about data diodes https://en.wikipedia.org/wiki/Unidirectional_network which seem under-discussed and under-utilized. Only a handful of discussions on HN, most substantial (only 19 comments) from 10 years ago https://news.ycombinator.com/item?id=10213836 if I understand correctly, only used in very high security environments, but plausibly could be used in many applications that don't really need to be connected for input but could just broadcast or vice versa (many IoT devices). Thank you, thought provoking!

sublimefire•9mo ago
It was an interesting read whilst having a cup of coffee. But rather shallow. A couple of mentions of some tools: goreshell, shadowpad, scatterbrain. It might be targeting C-suite folks more than analysts or other security folks. It is more about how you should be slightly afraid to do it on your own and better hire sentinelone to help you.
0xEF•9mo ago
Now that you mention it, the article does read like curated content. I suppose a piece does not have to be directly selling anything to be an advertisement. Fluff can do just as good a job by simply making readers feel good about a brand.
nonrandomstring•9mo ago
The essence of the article is a topic of concern, but is expressed rather lightly in TFA. End runs around security happen at the edges. From the bottom; by undermining hardware, or code libraries, supply chains. And we're now seeing "decapitation attacks" right at the top. Our "western" security models have a weakness, with their roots in Prussian military organisation and bureaucratic technical management, by default they trust up. The whole DOGE caper (what I would call a Dr Strangelove scenario - variation of insider-threat) exposes this as actually very vulnerable.

Cybersecurity services that operate as MSPs (the acronym variation where S is for security) hit a fundamental problem. A managed security provider becomes a bigger and juicer target since all of its clients are implied spoils. If they in turn defer-to/buy-from bigger actors up the food chain, those become juicer targets too.

This a frequent chestnut when we interview cybsersecurity company CEOs. Although it resurfaces the old "Who guards the guardians?", there is more to it. One has to actively avoid concentrating too much "power" (non-ironically a synonym of vulnerability ... heavy lies the crown) in one place, but to distribute risk by distributing responsibility for building trust relations (TFA mentions this). I expect we'll see more and more of this sort of thinking as events unfold.

PeterStuer•9mo ago
I tuned in late to this show. Are they down to tHe DPRK because they already successfully rooted out the MOSSAD, CIA and NSA insiders in previous episodes?
Cthulhu_•9mo ago
It's an American based company, they still assume those parties are on their side.
a3w•9mo ago
Or at least powerful enough to just march in with a court order, taking the company onto the side of them at a whim.
praptak•9mo ago
A good reason to reconsider using their services if you are outside US or even just potentially undesirable in the eyes of US administration.
ElWalkingBeard•9mo ago
About 7GB of RAM, in my experience
motohagiography•9mo ago
the key message to me was a reminder that setting up front companies to purchase security services and software for reverse engineering and competitive analysis is table stakes.

I knew it was common, even standard in some playbooks, but I always underestimate the parallel black market services economy.

mediumsmart•9mo ago
I am glad they don't have to pay for training - rule 1,2 and 3 - keep your overheads low.
gitroom•9mo ago
straight up, i always underestimate how much black market stuff runs alongside the official security game. you think closing those leaks really comes down to better tech or is it always just smarter people?
ganoushoreilly•9mo ago
The excess use of — within this really screams "I Used ChatGPT to write/rewrite this".

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
539•klaussilveira•9h ago•150 comments

The Waymo World Model

https://waymo.com/blog/2026/02/the-waymo-world-model-a-new-frontier-for-autonomous-driving-simula...
865•xnx•15h ago•525 comments

How we made geo joins 400× faster with H3 indexes

https://floedb.ai/blog/how-we-made-geo-joins-400-faster-with-h3-indexes
73•matheusalmeida•1d ago•15 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
185•isitcontent•10h ago•21 comments

Monty: A minimal, secure Python interpreter written in Rust for use by AI

https://github.com/pydantic/monty
186•dmpetrov•10h ago•82 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
296•vecti•12h ago•132 comments

Dark Alley Mathematics

https://blog.szczepan.org/blog/three-points/
72•quibono•4d ago•15 comments

Microsoft open-sources LiteBox, a security-focused library OS

https://github.com/microsoft/litebox
346•aktau•16h ago•168 comments

Sheldon Brown's Bicycle Technical Info

https://www.sheldonbrown.com/
341•ostacke•15h ago•90 comments

Hackers (1995) Animated Experience

https://hackers-1995.vercel.app/
437•todsacerdoti•17h ago•226 comments

Unseen Footage of Atari Battlezone Arcade Cabinet Production

https://arcadeblogger.com/2026/02/02/unseen-footage-of-atari-battlezone-cabinet-production/
8•videotopia•3d ago•0 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
240•eljojo•12h ago•147 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
4•helloplanets•4d ago•0 comments

Delimited Continuations vs. Lwt for Threads

https://mirageos.org/blog/delimcc-vs-lwt
15•romes•4d ago•2 comments

PC Floppy Copy Protection: Vault Prolok

https://martypc.blogspot.com/2024/09/pc-floppy-copy-protection-vault-prolok.html
43•kmm•4d ago•3 comments

An Update on Heroku

https://www.heroku.com/blog/an-update-on-heroku/
378•lstoll•16h ago•253 comments

How to effectively write quality code with AI

https://heidenstedt.org/posts/2026/how-to-effectively-write-quality-code-with-ai/
222•i5heu•12h ago•166 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
14•denuoweb•1d ago•2 comments

Why I Joined OpenAI

https://www.brendangregg.com/blog/2026-02-07/why-i-joined-openai.html
94•SerCe•5h ago•77 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
62•phreda4•9h ago•11 comments

Learning from context is harder than we thought

https://hy.tencent.com/research/100025?langVersion=en
162•limoce•3d ago•82 comments

I spent 5 years in DevOps – Solutions engineering gave me what I was missing

https://infisical.com/blog/devops-to-solutions-engineering
128•vmatsiiako•14h ago•55 comments

Introducing the Developer Knowledge API and MCP Server

https://developers.googleblog.com/introducing-the-developer-knowledge-api-and-mcp-server/
38•gfortaine•7h ago•11 comments

Zlob.h 100% POSIX and glibc compatible globbing lib that is faste and better

https://github.com/dmtrKovalenko/zlob
6•neogoose•2h ago•2 comments

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/
261•surprisetalk•3d ago•35 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
18•gmays•5h ago•2 comments

I now assume that all ads on Apple news are scams

https://kirkville.com/i-now-assume-that-all-ads-on-apple-news-are-scams/
1030•cdrnsf•19h ago•428 comments

FORTH? Really!?

https://rescrv.net/w/2026/02/06/associative
55•rescrv•17h ago•19 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
84•antves•1d ago•60 comments

WebView performance significantly slower than PWA

https://issues.chromium.org/issues/40817676
19•denysonique•6h ago•2 comments