RC RANDOM CHAOS
RC RANDOM CHAOS

Tech · Culture · Fiction

Article

A postcard breached a warship

A 5 dollar Bluetooth tracker hidden in a postcard broadcast a 585 million dollar warship's position for 24 hours. The control that failed was classification.

Article AI agents

Engineering teams keep granting agents production database writes

AI agent vulnerabilities are systems engineering failures, not security failures. The fix is architectural containment, not better prompts or guardrails.

Article cybersecurity

Lagos published guidelines, not controls

Lagos cybersecurity guidelines describe intent, not enforcement. An operator analysis of why policy without system-level controls does not stop attackers.

Article cybersecurity

Pick offense or defense

Two paths into infosec - offense and defense - broken down at the mechanism level. Foundation, tooling, telemetry, and the divergence point.

Article microsoft teams

The helpdesk chat window is the breach

Microsoft Teams helpdesk impersonation succeeds because identity verification is placed at the channel boundary, not at the credential action.

Article hardware implant

The power adapter was the attack

A WiFi camera concealed in a hotel power adapter transmitted to a foreign server. The boundary failed at the physical layer.

Article cisco-breach

Your security scanner is the breach.

Cisco source code stolen, AWS keys breached, 300 repositories cloned. The exfiltration channel was Trivy operating inside Cisco's CI pipeline.

The Wire — latest

All →

Stay in the loop

New writing delivered when it's ready. No schedule, no spam.