• 3 Posts
  • 137 Comments
Joined 1 year ago
cake
Cake day: June 19th, 2023

help-circle

  • It’s not X turning into Y when it comes to evolution. There were all kinds of different dinosaurs, that evolved I to all kinds of different niches. Most of those then went extinct due to rocks falling from the sky, or the entirety of India turning into a huge volcano etc.

    So it’s not that a T-Rex turned into a chicken, it’s that T-Rexs lived alongside other dinosaurs that developed feathers and filled more niches etc. those that survived eventually became birds. (Have you ever seen an Emu up close?!? No wonder the Australians lost to them 🤣)

    Disclaimer: I have no specific knowledge. Also, remember this happened over (billions? hundreds of millions) of years.

    Other comments about just not noticing feathers are valid too.
















  • You can probably get the URL for a companies SharePoint pretty easily, but you need a login. You are able to get a PAs credentials through a phishing link etc but need the 2fa code.

    You do the IT phishing attack (enter this code for me to fix your laptop being slow…), get them to enter the code and now you have access to a SharePoint instance full of confidential docs etc.

    I’m not saying it’s a great attack vector, but it’s not that different to a standard phishing attack.

    You could attack anything that’s using the single sign on. Attack their build infrastructure and you now have a supply chain attack against all of their customers etc.

    It helps but its not enough to counter the limits of human gullibility.