Hacker News with Generative AI: Information Security

Investigating an "Evil" RJ45 Dongle (lcamtuf.substack.com)
When it comes to information security headlines, a good rule of thumb is that claims about about widespread supply-chain sabotage are usually false.
Help me find a blogpost I saw here once (ycombinator.com)
Within the past 2 years. It was specifically about correlating information obtained from dumps of breached websites to identify users and take advantage of password reuse to hack accounts.
Deception for Information Security Blog (bluepillsecurity.com)
Definitions of important terms in deception-for-security
CMMC 2.0: A Well-Intentioned Misstep in Cybersecurity (nationaldefensemagazine.org)
5 Years of InfoSec Focused Homelabbing (archcloudlabs.com)
The Cryptographic Doom Principle (2011) (moxie.org)
Mastering Osint: How to Find Information on Anyone (osintteam.blog)
Simple ways to find exposed sensitive information (trickster.dev)
Information Security: "We Can Do It, We Just Choose Not To" (hezmatt.org)
Scooping the Loop Snooper (2000) (ed.ac.uk)
How to avoid accidentally sharing proprietary information of a former employer? (stackexchange.com)