Securityblog's profile picture. There are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer

Securityblog

@Securityblog

There are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer

Securityblog أعاد

Slide deck and recording of my presentation "Inside Pandora's Box: dissecting the latest arsenal and tactics of APT27" at #vb2025 is now available. Thank you to @virusbtn for organizing such an amazing conference!! youtu.be/TUATnkPEsnc virusbulletin.com/conference/vb2…

mopisec's tweet card. Inside Pandora's Box: dissecting the latest arsenal and tactics of...

youtube.com

YouTube

Inside Pandora's Box: dissecting the latest arsenal and tactics of...

Excited to announce that my talk "Inside Pandora's Box: Dissecting the latest arsenal and tactics of APT27" has been accepted at Virus Bulletin 2025 ( #vb2025 ) . I am looking forward to share my research everyone there! 🔗virusbulletin.com/conference/vb2…

mopisec's tweet image. Excited to announce that my talk "Inside Pandora's Box: Dissecting the latest arsenal and tactics of APT27" has been accepted at Virus Bulletin 2025 ( #vb2025 ) . I am looking forward to share my research everyone there!
🔗virusbulletin.com/conference/vb2…


Securityblog أعاد

I noticed that @brucon talks are published in Youtube, including my "Epic" talk on Entra ID Token Theft Protections! Besides the technical part, by watching the talk you'll learn: ✅ How to survive live-only-demo-talk when network isn't working 🥵 ✅ How to reveal your demo…

DrAzureAD's tweet image. I noticed that @brucon talks are published in Youtube, including my "Epic" talk on Entra ID Token Theft Protections! 

Besides the technical part, by watching the talk you'll learn:
✅ How to survive live-only-demo-talk when network isn't working 🥵
✅ How to reveal your demo…

Securityblog أعاد

Investigating Kernel Mode Shadow Stacks on Windows connormcgarr.github.io/km-shadow-stac…

raashidbhatt's tweet image. Investigating Kernel Mode Shadow Stacks on Windows 

connormcgarr.github.io/km-shadow-stac…

Securityblog أعاد

Omg finally!! I've been refreshing the Troopers YouTube page for so long lol 😂


Securityblog أعاد

Universal 1-click RCE exploit to PWN automotive industry by @konatabrk konatabrk.github.io/perfektblue/

alexjplaskett's tweet image. Universal 1-click RCE exploit to PWN automotive industry by @konatabrk

konatabrk.github.io/perfektblue/
alexjplaskett's tweet image. Universal 1-click RCE exploit to PWN automotive industry by @konatabrk

konatabrk.github.io/perfektblue/
alexjplaskett's tweet image. Universal 1-click RCE exploit to PWN automotive industry by @konatabrk

konatabrk.github.io/perfektblue/
alexjplaskett's tweet image. Universal 1-click RCE exploit to PWN automotive industry by @konatabrk

konatabrk.github.io/perfektblue/

Securityblog أعاد

🎅 Oh Oh Oh it is that time again! Last year I launched the GenAI x Sec Advent and shared one practical tip per day about AI and Threat Intelligence until December 24. You really enjoyed the first edition so I am doing it again this year. First post drops Monday December 1.…


Securityblog أعاد

Only a few days left to the Black Friday sale. Until December 1st, all individual TrainSec courses are 40 percent off with code BF2025. If you’ve been waiting to dive into Windows internals, kernel programming, or low-level debugging without committing to a full learning path,…


Securityblog أعاد

Turns out older unsupported versions of FortiWeb 6.x are also vulnerable to the full RCE chain. New pull request in the queue adds support for 6.x targets to the @metasploit exploit, and successfully verified across versions 8.0.1, 7.4.8, 6.4.3, and 6.3.9. github.com/rapid7/metaspl…

We now have a (draft) @metasploit exploit module for the recent Fortinet FortiWeb vulns, chaining CVE-2025-64446 (auth bypass) + CVE-2025-58034 (command injection) to achieve unauthenticated RCE with root privileges: github.com/rapid7/metaspl…

stephenfewer's tweet image. We now have a (draft) @metasploit exploit module for the recent Fortinet FortiWeb vulns, chaining CVE-2025-64446 (auth bypass) + CVE-2025-58034 (command injection) to achieve unauthenticated RCE with root privileges: github.com/rapid7/metaspl…


Securityblog أعاد

Introducing Early Cascade Injection: From Windows Process Creation to Stealthy Injection outflank.nl/blog/2024/10/1…


Securityblog أعاد

Getting RCE on Brother printer (MFC-J1010DW) by chaining three vulnerabilities starlabs.sg/blog/2025/11-b… Credits Nguyên Đăng Nguyên & Manzel Seet & Amos Ng (@starlabs_sg) #infosec

0xor0ne's tweet image. Getting RCE on Brother printer (MFC-J1010DW) by chaining three vulnerabilities

starlabs.sg/blog/2025/11-b…

Credits Nguyên Đăng Nguyên & Manzel Seet & Amos Ng (@starlabs_sg)

#infosec
0xor0ne's tweet image. Getting RCE on Brother printer (MFC-J1010DW) by chaining three vulnerabilities

starlabs.sg/blog/2025/11-b…

Credits Nguyên Đăng Nguyên & Manzel Seet & Amos Ng (@starlabs_sg)

#infosec

Securityblog أعاد

If you are building SIEM & SOC functionality from scratch and assuming you have all the required logs - what are the first 5 detection rules you create?


Securityblog أعاد

Happy Black Friday to everyone except the hacker who came bargain-hunting in the wrong network. 🙂

HuntressLabs's tweet image. Happy Black Friday to everyone except the hacker who came bargain-hunting in the wrong network. 🙂

Securityblog أعاد

Entra ID WatchTower V2.0 is coming up. 22x faster than V1. Direct API ingestion and analytics. Learn more: docs.kaidojarvemets.com/solutions/entr… #EntraID #Microsoft #IncidentManagement

kaidja's tweet image. Entra ID WatchTower V2.0 is coming up. 22x faster than V1.

Direct API ingestion and analytics.

Learn more: docs.kaidojarvemets.com/solutions/entr…

#EntraID #Microsoft #IncidentManagement

Securityblog أعاد

Securityblog أعاد

#Lazarus DFlexibleFerret macOS attack operators lure victims through fake job-assessment websites and convince them to run a Terminal one-liner. This executes a remote bash script that detects CPU architecture, downloads and extracts a ZIP payload, installs a LaunchAgent for…

blackorbird's tweet image. #Lazarus DFlexibleFerret macOS attack 
operators lure victims through fake job-assessment websites and convince them to run a Terminal one-liner. 
This executes a remote bash script that detects CPU architecture, downloads and extracts a ZIP payload, installs a LaunchAgent for…
blackorbird's tweet image. #Lazarus DFlexibleFerret macOS attack 
operators lure victims through fake job-assessment websites and convince them to run a Terminal one-liner. 
This executes a remote bash script that detects CPU architecture, downloads and extracts a ZIP payload, installs a LaunchAgent for…

SectorA01 (#Lazarus) employed a highly sophisticated, multi-stage attack chain beginning with social engineering via a fake official Deriv trading platform installer (NSIS-based). The infection progresses through a polyglot payload sequence (NSIS → Electron/JavaScript → Python…

blackorbird's tweet image. SectorA01 (#Lazarus) employed a highly sophisticated, multi-stage attack chain beginning with social engineering via a fake official Deriv trading platform installer (NSIS-based). 
The infection progresses through a polyglot payload sequence (NSIS → Electron/JavaScript → Python…
blackorbird's tweet image. SectorA01 (#Lazarus) employed a highly sophisticated, multi-stage attack chain beginning with social engineering via a fake official Deriv trading platform installer (NSIS-based). 
The infection progresses through a polyglot payload sequence (NSIS → Electron/JavaScript → Python…


Securityblog أعاد

🌐 AdaptixC2 Uncovered: Capabilities, Tactics & Hunting Strategies hunt.io/blog/adaptixc2… Two months ago, we did A deep-dive to explore the lightweight yet full-featured command-and-control framework AdaptixC2. The research reveals how a modular, open-source C2 tool is…


Securityblog أعاد

⚡ Security Warning! Attackers can bypass Microsoft Defender for Office 365 by exploiting Teams’ guest access. When users join another organization’s tenant, they lose their home protections — and a malicious tenant can use that gap to deliver phishing or malware. Read ↓…

TheHackersNews's tweet image. ⚡ Security Warning!

Attackers can bypass Microsoft Defender for Office 365 by exploiting Teams’ guest access.

When users join another organization’s tenant, they lose their home protections —
and a malicious tenant can use that gap to deliver phishing or malware.

Read ↓…

Securityblog أعاد

Black Friday Giveaway & Exclusive Discounts Win FREE access to: • 1 CRTE seat • 1 CETP seat How to participate: 1️⃣ Like this post 2️⃣ Comment which course you’re interested in and why 3️⃣ Repost Winners will be randomly selected and announced on December 2, 2025. Those who’ve…

AlteredSecurity's tweet image. Black Friday Giveaway & Exclusive Discounts

Win FREE access to:
• 1 CRTE seat
• 1 CETP seat

How to participate:
1️⃣ Like this post
2️⃣ Comment which course you’re interested in and why
3️⃣ Repost

Winners will be randomly selected and announced on December 2, 2025.
Those who’ve…

Securityblog أعاد
IntCyberDigest's tweet image. check.labs.greynoise.io

This holiday season, run our IP Check at your family’s house, a free tool that answers a question we hear constantly: "How do I know if my home network has been compromised?" greynoise.io/blog/your-ip-a…



Securityblog أعاد

New release: #TinyTracer v3.2 is out: github.com/hasherezade/ti…

hasherezade's tweet image. New release:  #TinyTracer v3.2 is out: github.com/hasherezade/ti…

Loading...

Something went wrong.


Something went wrong.