Skip Navigation
'The Game Just Fundamentally Undermines Itself': Game Designer Breaks Down 'Baldur's Gate 3's Most Fatal Flaws
  • I experienced an instant game over a couple hours in on my first playthrough on the crashed nautiloid. When I found the wounded mind flayer, I tried to peer into his mind and failed the roll leading to him overpowering me. I became a thrall while Asterion and Shadowheart watched. No option to revive during the cutscene.

  • Ransomware: To Pay or Not to Pay
  • I hope you're right that it does phase out. Here is evidence that having cyber insurance makes you more of a target.

    DS: Do your operators target organizations that have cyber insurance?

    UNK: Yes, this is one of the tastiest morsels. Especially to hack the insurers first—to get their customer base and work in a targeted way from there. And after you go through the list, then hit the insurer themselves.

    Interview

  • Ransomware: To Pay or Not to Pay
  • I agree with the author's solution to organizations of protection and resilience and that paying ultimately hurts everyone. If everyone refused to pay, we may see these types of attacks diminish.

    The challenge to cyber security professionals will always be the convincing senior leadership to understand why not paying is better in the long run.

    Having that conversation in the moment is too late. There needs to be a cyber attack response plan communicated and approved before disaster strikes.

    Even so, there will always be the friction of cost. Senior leaders will weigh the cost of paying to the cost of downtime/repair and the social stigma if your company provides a service to customers. If your original argument isn't strong enough, cost will win.

    One more point is paying is also a systemic issue. Cyber insurance is becoming popular for business. What we have seen with some insurers, their solution for ransomware is coverage to pay the ransom, perpetuating the problem.

  • New Covid vaccines are on the way as 'Eris' variant rises
  • Thanks, appreciate your concern. I'm trying to rest, but unfortunately soundly sleeping has been challenging. My nose is congested but still dripping if that makes sense. My mouth dries out and I'm waking up constantly. I'll try to get some reprieve beyond the 5 days.

  • New Covid vaccines are on the way as 'Eris' variant rises
  • I'm 2+1 and just tested positive for COVID yesterday. I had COVID previously in 2021 as well. Symptoms are mild with runny nose, headache, fatigue, and a light cough.

    Catching it again has me comparing the environment then and now and made the COVID apathy more apparent. Most co-worker responses have been either "That's still a thing?" to "Throw a mask on and come back into the office." I've elected to isolate to not be responsible for more spread. The frustrating thing is looking for guidance and most articles are dated in 2022. The pharmacy had fewer stock of masks and COVID tests were in the back now.

    I'm all for continuing to receive regular vaccinations like I do for the flu. If anything to continue to keep the symptoms mild.

  • Planning on getting the game. This is how I imagine it's gonna go.
  • You can add the executable as a non-steam game to launch and play through steam, but that is all.

    GOG sells full games, not keys, however you 100% own the game. It's provided to you DRM free with no activation or online phone home requirements.

  • Planning on getting the game. This is how I imagine it's gonna go.
  • In the same boat. Literally reading the discourse about how this game is 'setting too high a standard' and want to support this kind of effort. Also bought through Good Old Games to support their philosophies as well.

  • /c/cybersecurity - Cybersecurity News & Discussion @lemmy.ml Sparkega @lemmy.world
    Hacker Archetypes - D&D Classes
    www.gosecure.net How Unparalleled RDP Monitoring Reveal Attackers’ Tradecraft - GoSecure

    Luring threat actors into RDP traps reveals attackers' tactics. This blog summarizes an hour-long presentation about what can be found in those traps.

    How Unparalleled RDP Monitoring Reveal Attackers’ Tradecraft - GoSecure

    Researchers analyzed 190 million hacking events on a honeynet and categorized the types of hackers into Dungeons and Dragons classses.

    Rangers evaluate the system and set conditions for a follow-on attack.

    Thieves install cryptominers and other profiteering software.

    Barbarians attempt to brute force their way into adjacent systems.

    Wizards connect the newly compromised system to a previous to establish 'portals' to tunnel through to obscure their identity.

    Bards have no apparent hacking skill and likely purchase or otherwise acquired access. They perform basic computer tasks.

    0
    Using this as a pentesting tool for work?
  • It's a tool like any others. I think it's worth including in your kit for it's range of capabilities. This item is freely available and could be used by anyone. Including it in your assessment replicates the current threat environment.

  • InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SP
    Sparkega @lemmy.world
    Posts 1
    Comments 22