Securityblog's profile picture. There are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer

Securityblog

@Securityblog

There are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer

Securityblog 已轉發

My very first blog post is live: kiddo-pwn.github.io/blog/2025-11-3… During research, I've run into and documented a simple universal SQLite Injection RCE trick. Enjoy! N-day Analysis about Synology Beestation RCE (CVE-2024-50629~50631) by legendary DEVCORE 🎃 🍊 Thanks to @u1f383


Securityblog 已轉發

Latest updates: Ransomware Internals training updated - Enumerating Windows File System Volumes - Linear Traversal for File Enumeration Updated syllabus: maldevacademy.com/ransomware-cou… Maldev Database - 77 Python snippets added Database: search.maldevacademy.com/updates


Securityblog 已轉發

We're not far away from #BSidesLDN2025 Please! Tickets are free, so cancel your ticket if can no longer make the day! Many people are looking for a ticket & each unused ticket is a potential opportunity taken from someone else. Don't be that person! #Security #BSides #London


Securityblog 已轉發

Today is the last day of the Black Friday sale. Buy now, or forever hold your peace. zeropointsecurity.co.uk/courses


Securityblog 已轉發

Pwn2Own 2025: Pwning Lexmark’s Postscript Processor by @boredpentester boredpentester.com/pwn2own-2025-p…

alexjplaskett's tweet image. Pwn2Own 2025: Pwning Lexmark’s Postscript Processor by @boredpentester 

boredpentester.com/pwn2own-2025-p…
alexjplaskett's tweet image. Pwn2Own 2025: Pwning Lexmark’s Postscript Processor by @boredpentester 

boredpentester.com/pwn2own-2025-p…
alexjplaskett's tweet image. Pwn2Own 2025: Pwning Lexmark’s Postscript Processor by @boredpentester 

boredpentester.com/pwn2own-2025-p…

Securityblog 已轉發

💉 DLL Injection For Dummies (Lofi ASMR Edition) 🌠 Advanced Techniques Detailed 🛠️ Loading, Injecting & Ejecting DLLs 👉 youtube.com/watch?v=jf1al_…


Securityblog 已轉發

A pentester's bread and butter: API testing. Don't go any further until you've completed this learning path! This learning path focuses on API reconnaissance, teaching you how to discover hidden API attack surfaces and identify server-side parameter pollution vulnerabilities…

WebSecAcademy's tweet image. A pentester's bread and butter: API testing.

Don't go any further until you've completed this learning path!

This learning path focuses on API reconnaissance, teaching you how to discover hidden API attack surfaces and identify server-side parameter pollution vulnerabilities…

Securityblog 已轉發

🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence If you follow my work you know I am a big fan of visualization to explain complex or technical content. I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…

fr0gger_'s tweet image. 🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence

If you follow my work you know I am a big fan of visualization to explain complex or technical content.

I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…
fr0gger_'s tweet image. 🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence

If you follow my work you know I am a big fan of visualization to explain complex or technical content.

I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…
fr0gger_'s tweet image. 🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence

If you follow my work you know I am a big fan of visualization to explain complex or technical content.

I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…
fr0gger_'s tweet image. 🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence

If you follow my work you know I am a big fan of visualization to explain complex or technical content.

I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM…

Securityblog 已轉發

I wanted to follow-up and let @M_haggis @nas_bench @Kostastsale @cyb3rbuff @_josehelps know that the Sysmon config for the LOLRMM framework is "effectively" complete for the primary areas of focus. I have intentions to add more filtering to it but it is. dodgethissecurity.com/2025/11/30/sys…


Securityblog 已轉發

interesting work! i’ve been working on something similar.. will share soon. cotool.ai/blog/evaluatin…

📊Today we're sharing initial results from one of our internal agent evals for Security Operations tasks. We replicated the @splunk BOTSv3 CTF environment in an eval to test frontier models' capability on realistic blue team cybersecurity tasks. BOTSv3 comprises over 2.7M logs…

cotoolai's tweet image. 📊Today we're sharing initial results from one of our internal agent evals for Security Operations tasks.

We replicated the @splunk BOTSv3 CTF environment in an eval to test frontier models' capability on realistic blue team cybersecurity tasks.

BOTSv3 comprises over 2.7M logs…


Securityblog 已轉發

“Microsoft admits AI agents can hallucinate and fall for attacks, but they’re still coming to Windows 11” TLDR: but we just want to jam AI into Windows because it’s cool and won’t benefit anyone but guys it’s cool. windowslatest.com/2025/11/30/mic…


Securityblog 已轉發

‼️ YouTube is removing educational cybersecurity videos This is the video in question.

Quick update on your appeal: We brought it to the policy team. They confirmed the video violates the Harmful or dangerous content policy, and the original decision is upheld. Policy details here: goo.gle/4ahnV8L



Securityblog 已轉發

Microsoft confirmed a Windows 11 bug where the password login icon vanishes from the lock screen after the August update, forcing users to click an invisible space to sign in. #Windows11Bug #LockScreenGlitch #Microsoft securityonline.info/windows-11-bug…


Securityblog 已轉發

"Unmasking a new DPRK Front Company DredSoftLabs" published by Wickeren. #Wagemole, #DPRK, #CTI medium.com/@meeswicky1100…


Securityblog 已轉發

macOS seems to become a trendy target lately There is an insight from @g0njxa’s blog post, that XFILES group is currently working on Spyware for macOS 👀

A short interview with XFILES (also known by researchers as DeerStealer) 🦌 Since 2021 on the playground, alledgelling offering multiple malware solution for both Windows but recently also MacOS 👀 Read here 👇👇 g0njxa.medium.com/approaching-st…



Securityblog 已轉發

We draw the line at beer ✋ Dive into our latest breakdown on the Asahi Group breach: how Qilin slipped past defenses - mapped to MITRE ATT&CK - and brought a global brewery’s production line to a halt. Find the full story on our #blog: okt.to/ovWfHA #HackTheBox #HTB

hackthebox_eu's tweet image. We draw the line at beer ✋
Dive into our latest breakdown on the Asahi Group breach: how Qilin slipped past defenses - mapped to MITRE ATT&CK - and brought a global brewery’s production line to a halt.

Find the full story on our #blog: okt.to/ovWfHA

#HackTheBox #HTB…

Securityblog 已轉發

Final part of the first wave of RPC is live, RPC part8. In this part, I explain how to use IDA to reverse RPC clients and servers, and I show the key structures and methods you need to extract all the important information during the reversing process. sud0ru.ghost.io/windows-inter-…


Securityblog 已轉發

Small teaser of an Agent ID integrated demo app I'm building that runs with zero Microsoft technologies and frameworks and using Entra ID for auth. This is to prove that Agent ID is for ALL agents, not just ones built on Microsoft technologies or running on Microsoft platforms.…

merill's tweet image. Small teaser of an Agent ID integrated demo app I'm building that runs with zero Microsoft technologies and frameworks and using Entra ID for auth. 

This is to prove that Agent ID is for ALL agents, not just ones built on Microsoft technologies or running on Microsoft platforms.…

Securityblog 已轉發

Lateral movement is where a single compromised host quietly becomes a full incident. 🚨 Spotting it early means catching subtle signals, unusual auth paths, unexpected remote execution, privilege jumps, and more. For a clear, structured breakdown of how to detect and stop it…

CyberDefenders's tweet image. Lateral movement is where a single compromised host quietly becomes a full incident. 🚨
Spotting it early means catching subtle signals, unusual auth paths, unexpected remote execution, privilege jumps, and more.

For a clear, structured breakdown of how to detect and stop it…

Loading...

Something went wrong.


Something went wrong.