Back when I was important, I saw the common trend of incidents being reported on Fridays or right before holiday breaks. I started asking the reporters (while thanking them) "why did you report it when you did?" and the response was consistent: "I knew this was important and I didn't want it to sit over the weekend/holiday without anyone knowing about it".
I suspect there may be a similar situation with discovered vulnerabilities.
My support roles always saw a spike in tickets just before lunchtime, and just before close of business. I always thought people had a list of things to get done before noon, and another list to get done before they leave for the day.
I had a long discussion with a (MD of psychology) friend years ago about the "last chance" urgency effect on our brains. Essentially the same phenomenon that is believed to cause a squirrel to think "AHHH, RUN NOW" at the worst possible moment when a car is approaching.
I wonder if some of the same basal survival instinct wiring is responsible for this phenomenon. π
@phreakmonkey perhaps. though I gather that these people thought they were actually being helpful and not doing it out of self preservation. Maybe that is there at some level, though, and the layers of cognition just build a cover story
@phreakmonkey Well it seems plausible, and itβs a good answer... They (the reporter/s) get hold of the story, they try to dig deeper, work on verifyingβ¦ this of course being the workng week. By the end of the week, if they feel it is important enough, they - being known to be so altruistic - donβt want to βsitβ on it... or much more likely, they are worried someone else might scoop them.
So I'm batting .200, it was Ironport on the Cisco side, and then also Sonicwall Management. But it's only hump day, we still got some time till push to prod day.
An automated campaign is targeting multiple VPN platforms, with credential-based attacks being observed onΒ Palo Alto Networks GlobalProtect and Cisco SSL VPN.
https://www.bleepingcomputer.
Internet security watchdog Shadowserver has found over 25,000 Fortinet devices exposed online with FortiCloud SSO enabled, amid ongoing attacks targeting a critical authentication bypass vulnerability.
https://www.bleepingcomputer.
CVE ID: CVE-2025-14733
Vendor: WatchGuard
Product: Firebox
Date Added: 2025-12-19
Notes: Check for signs of potential compromise on all internet accessible instances after applying mitigations. For more information please see: https://www.watchguard.
Simon Zerafa (Status: π)
in reply to Jerry π¦ππ¦ • • •ZeroDay Bae
in reply to Jerry π¦ππ¦ • • •Dave Wilburn
in reply to Jerry π¦ππ¦ • • •Why?
Why would you put this out into the universe, Jerry?
Jerry π¦ππ¦
in reply to Dave Wilburn • • •Jerry π¦ππ¦
in reply to Jerry π¦ππ¦ • • •RE: infosec.exchange/@jerry/115735β¦
Back when I was important, I saw the common trend of incidents being reported on Fridays or right before holiday breaks. I started asking the reporters (while thanking them) "why did you report it when you did?" and the response was consistent: "I knew this was important and I didn't want it to sit over the weekend/holiday without anyone knowing about it".
I suspect there may be a similar situation with discovered vulnerabilities.
Jerry π¦ππ¦
2025-12-17 15:01:51
royal
in reply to Jerry π¦ππ¦ • • •K.C. Budd
in reply to Jerry π¦ππ¦ • • •I had a long discussion with a (MD of psychology) friend years ago about the "last chance" urgency effect on our brains. Essentially the same phenomenon that is believed to cause a squirrel to think "AHHH, RUN NOW" at the worst possible moment when a car is approaching.
I wonder if some of the same basal survival instinct wiring is responsible for this phenomenon. π
Jerry π¦ππ¦
in reply to K.C. Budd • • •Daniel Blake
in reply to Jerry π¦ππ¦ • • •Pauliehedron β
in reply to Jerry π¦ππ¦ • • •Pauliehedron β
in reply to Pauliehedron β • • •Jerry π¦ππ¦
in reply to Pauliehedron β • • •Pauliehedron β
in reply to Jerry π¦ππ¦ • • •We're getting there! Something this way comes...
infosec.exchange/@BleepingCompβ¦
BleepingComputer (@BleepingComputer@infosec.exchange)
BleepingComputer (Infosec Exchange)Pauliehedron β
in reply to Pauliehedron β • • •Son of a biscuit
infosec.exchange/@BleepingCompβ¦
BleepingComputer (@BleepingComputer@infosec.exchange)
BleepingComputer (Infosec Exchange)Jerry π¦ππ¦
in reply to Pauliehedron β • • •Pauliehedron β
in reply to Jerry π¦ππ¦ • • •We have a new contender!
mastodon.social/@cisakevtrackeβ¦
CISA KEV Tracker (@cisakevtracker@mastodon.social)
CISA KEV Tracker (Mastodon)kwayk42
in reply to Jerry π¦ππ¦ • • •Cloudflare : *stands in the corner looking nervous*
Also Cloudflare : We... We don't count as a firewall, right?
#FuckCloudflare
Jerry π¦ππ¦
Unknown parent • • •B'ad Samurai ππΊπ¦
in reply to Jerry π¦ππ¦ • • •What is a chimney but path traversal.
#pathtraversalmemes
corq
in reply to Jerry π¦ππ¦ • • •considerate
in reply to Jerry π¦ππ¦ • • •Kluthulhu' XOR 1=1--
in reply to Jerry π¦ππ¦ • • •Tobias Fiebig
in reply to Jerry π¦ππ¦ • • •