ByteShell101's profile picture. SOC Analyst . ambitious security person, AI Automation

Byte

@ByteShell101

SOC Analyst . ambitious security person, AI Automation

Repost di Byte

October 15th, 2025, F5 networks submitted SEC 8-K disclosing they had suffered a network compromise. tl;dr some source code stolen, some customer data stolen, potentially impacts usa gov national security F5 reports that they had suffered a compromise through a suspected nation…


Repost di Byte

Weird stuff going on. This is a CRAZY anime arc. I beg you to read this post. This shit is crazy. Check this shit out June 16th, 2025: @phrack reports suspected offensive state-sponsored activity from China and/or North Korea targeting South Korea. They notify KR-CERT (Defense…

vxunderground's tweet image. Weird stuff going on. This is a CRAZY anime arc. I beg you to read this post. This shit is crazy.

Check this shit out

June 16th, 2025: @phrack reports suspected offensive state-sponsored activity from China and/or North Korea targeting South Korea. They notify KR-CERT (Defense…

Repost di Byte

🚨 Scattered Spider’s New Playbook — Insider Recruitment & Access Marketplace The group has moved from chaotic data leaks to an organized cybercrime model. They’re now: 🔸 Recruiting employees and insiders in telecom, SaaS, gaming, and hosting firms (US/UK/AU/CA/FR). 🔸…

FalconFeedsio's tweet image. 🚨 Scattered Spider’s New Playbook — Insider Recruitment & Access Marketplace

The group has moved from chaotic data leaks to an organized cybercrime model.

They’re now:
🔸 Recruiting employees and insiders in telecom, SaaS, gaming, and hosting firms (US/UK/AU/CA/FR).
🔸…
FalconFeedsio's tweet image. 🚨 Scattered Spider’s New Playbook — Insider Recruitment & Access Marketplace

The group has moved from chaotic data leaks to an organized cybercrime model.

They’re now:
🔸 Recruiting employees and insiders in telecom, SaaS, gaming, and hosting firms (US/UK/AU/CA/FR).
🔸…
FalconFeedsio's tweet image. 🚨 Scattered Spider’s New Playbook — Insider Recruitment & Access Marketplace

The group has moved from chaotic data leaks to an organized cybercrime model.

They’re now:
🔸 Recruiting employees and insiders in telecom, SaaS, gaming, and hosting firms (US/UK/AU/CA/FR).
🔸…

Repost di Byte

🚨 Upcoming Secure by Default Settings Changes for Exchange and Teams APIs Starting late October to November 2025, Microsoft will require admin consent for third-party apps accessing Exchange and Teams content via Microsoft-managed default consent policy. Finally!👏…

0x534c's tweet image. 🚨 Upcoming Secure by Default Settings Changes for Exchange and Teams APIs

Starting late October to November 2025, Microsoft will require admin consent for third-party apps accessing Exchange and Teams content via Microsoft-managed default consent policy. Finally!👏…

Repost di Byte

Dear Threat Actors, I need Robux. Give me Robux. I know you're all a bunch of fucking degenerates spending your drainer money on that fucking game. Don't be stingy. Found some bullshit Roblox game. There is Robux spent leaderboard. Someone spent over $100,000 in this game. I…


Repost di Byte

cybersecurity


Repost di Byte

We are releasing details on BRICKSTORM malware activity, a China-based threat hitting US tech to potentially target downstream customers and hunt for data on vulnerabilities in products. This actor is stealthy, and we've provided a tool to hunt for them. cloud.google.com/blog/topics/th…


Repost di Byte
BushidoToken's tweet image. #ThreatHunting

Repost di Byte

The XOXO From Prague guy is back and he's compromising Lockbit ransomware group (again)

LockBit is down again —XOXO from Prague LockBit's 5.0 panel just got wrecked lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad[.onion] #LockBit #Ransomware

xoxofromprague's tweet image. LockBit is down again —XOXO from Prague
LockBit's 5.0 panel just got wrecked
lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad[.onion]
#LockBit #Ransomware
xoxofromprague's tweet image. LockBit is down again —XOXO from Prague
LockBit's 5.0 panel just got wrecked
lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad[.onion]
#LockBit #Ransomware
xoxofromprague's tweet image. LockBit is down again —XOXO from Prague
LockBit's 5.0 panel just got wrecked
lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad[.onion]
#LockBit #Ransomware
xoxofromprague's tweet image. LockBit is down again —XOXO from Prague
LockBit's 5.0 panel just got wrecked
lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad[.onion]
#LockBit #Ransomware


Repost di Byte

Friendly reminder, having a CISSP doesn't make you a good job candidate for exactly the same reason as having a drivers license doesn't make you a good driver


Repost di Byte

If you’re just stepping into cybersecurity, there are two brutal truths you must tattoo into your brain 1) No system is ever 100% secure. Once you accept this fact, you will be free. The name of the game is prioritization. If you're not sure, prioritize some more. 2) Jeffrey…


Repost di Byte

Update: Microsoft has released security updates that fully protect customers using all supported versions of SharePoint affected by CVE-2025-53770 and CVE-2025-53771.

Microsoft has released security updates that fully protect customers using all supported versions of SharePoint affected by CVE-2025-53770 and CVE-2025-53771. These vulnerabilities apply to on-premises SharePoint Servers only. Customers should apply these updates immediately to…



Repost di Byte

Microsoft has continuously observed hybrid attacks leading to espionage, business interruption, and ransomware deployment that involve threat actors moving from on-premises environments to the cloud. Many organizations manage their resources across different realms, including…

MsftSecIntel's tweet image. Microsoft has continuously observed hybrid attacks leading to espionage, business interruption, and ransomware deployment that involve threat actors moving from on-premises environments to the cloud. Many organizations manage their resources across different realms, including…

Repost di Byte

Microsoft and CrowdStrike are teaming up to create alignment across our threat actor taxonomies, mapping where knowledge of these actors align to enable security professionals to connect insights faster and make decisions with greater confidence. msft.it/6011SlOZ9


Repost di Byte

Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America. msft.it/6011S9JpN


Repost di Byte

Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an infostealer malware used by multiple financially motivated threat actors to target various industries. msft.it/6010Sd2zi


Repost di Byte

🚨 Fake CAPTCHA Evolution: Homoglyphs & Unicode ⚠️ The user sees a #CAPTCHA that prompts to press a few buttons instead of just clicking a checkbox. Pressing the keys triggers code execution, leading to system compromise. 👨‍💻 Using #ANYRUN Sandbox, security teams can dive into…

anyrun_app's tweet image. 🚨 Fake CAPTCHA Evolution: Homoglyphs & Unicode
⚠️ The user sees a #CAPTCHA that prompts to press a few buttons instead of just clicking a checkbox. Pressing the keys triggers code execution, leading to system compromise.

👨‍💻 Using #ANYRUN Sandbox, security teams can dive into…
anyrun_app's tweet image. 🚨 Fake CAPTCHA Evolution: Homoglyphs & Unicode
⚠️ The user sees a #CAPTCHA that prompts to press a few buttons instead of just clicking a checkbox. Pressing the keys triggers code execution, leading to system compromise.

👨‍💻 Using #ANYRUN Sandbox, security teams can dive into…

Repost di Byte

Microsoft Threat Intelligence observed a new and notable method used by the threat actor Storm-0249 for distributing the Latrodectus trojan, a malware loader designed to facilitate multi-stage attacks by downloading and installing additional payloads onto compromised devices.

MsftSecIntel's tweet image. Microsoft Threat Intelligence observed a new and notable method used by the threat actor Storm-0249 for distributing the Latrodectus trojan, a malware loader designed to facilitate multi-stage attacks by downloading and installing additional payloads onto compromised devices.

Loading...

Something went wrong.


Something went wrong.