Cyberkryption
@cyberkryption
CERT/CSIRT - Head of Cyber Defence Tweets are my own and do not represent my employer.🇯🇪
You might like
Good friend, good cause
Should I trust this online shop? Which payment method should I use? Who can I report a scam to?🛍️ Stay safe when shopping online with our top tips to help you purchase securely and avoid fraudulent websites. Read the full guidance: ncsc.gov.uk/guidance/shopp…
JPCERT/CC reports ongoing APT-C-60 attacks in Japan, revealing updates on malware tactics, including spear-phishing with malicious VHDX files, updates to the SpyGlace malware, and ongoing GitHub distribution efforts. #CyberSecurity #APT blogs.jpcert.or.jp/en/2025/11/APT…
Today I learned: Using diskshadow to fetch the NTDS.dit. As mentioned several times, I love reading the HTB writeups from 0xdf because I always learn something new. Like here [1]: "To dump the domain hashes, I’ll want to get the C:\Windows\NTDS.dit file. Unfortunately, this file…
Lessons from history everyone should know: How the U.S. kept saving russia. In the 1920s, russia begged the United States to save it from famine. The U.S. sent food, and soon after, russia seized new territories once held by the empire. 1/n
This is a sneaky scam - would your friend’s and family know this quirk of URLs? Hopefully @UPS can get this domain taken down.
James hetfield writes " “Without Black Sabbath, there would be no Metallica. Thank you boys for giving us a purpose in life”
UAC-0099's new tools: MATCHBOIL, MATCHWOK, DRAGSTARE Details: cert.gov.ua/article/6284949 (UA only)
🔍 T1588.007 – Unauthorized Agentic Access to Entra 🔥 Detects unauthorized, non-corporate devices running agentic AI programs attempting to access the Entra tenant—potentially for reconnaissance or data exfiltration. detections.ai/share/rule/PVH… #Cybersecurity #AgenticAIThreats…
Modern Binary Exploitation by @RPISEC. This was a university course developed and run solely by students to teach skills in vulnerability research, reverse engineering, and binary exploitation. github.com/RPISEC/MBE
Norway just launched a damless river turbine that generates power without blocking water Norwegian engineers have created a breakthrough in hydroelectric design — a river turbine system that generates power without any dams, barriers, or concrete channels. Installed in the…
"I found out that the cause of the infection was an installed malicious extension for the Cursor AI IDE" In this specific case, the extension was malicious right from the beginning. But just imagine a supply chain attack targeting an open-source developer’s system, compromising…
A few weeks ago, I was responding to a cybersecurity incident - $500,000 have been stolen from a #blockchain developer. The infected operating system was freshly installed, and the victim was vigilant about cybersecurity. How could this happen? New supply chain attack? [1/6]
Ozzy Flips Out When Sharon Incorporates Bubbles Into The Stage Show “Evil, Evil, What’s Evil About F’N Bubbles?” - Ozzy x.com/JVPALT1/status…
Ozzy Osbourne has passed away at the age of 76. I still can't believe it. A few weeks ago he was giving his final concert. I hope you came home, Ozzy ❤️https://t.co/XLcxWz4MqC
I successfully tested a LSASS dumping technique on a Windows 10 lab machine, which we encountered on a recent Incident Response engagement (no EDR, default Defender installed). The "MiniDumpWriteDump" technique, as described here [1], was successful in writing the LSASS process…
Detecting and preventing LSASS credential dumping attacks microsoft.com/en-us/security…
I'm starting another series - Buffer Overflows in the Modern Era. I'll go over the basics of using a debugger all the way to successfully achieving a buffer overflow exploit on Windows 11 24H2, using ROP gadgets and bypassing ASLR, etc. Here's part 1! g3tsyst3m.github.io/binary%20explo…
Nice
Just leaked 110+ plug-and-play n8n templates that multiple industries are paying me $10K+ for. Your weekend project: Pick any industry, copy-paste a workflow, start printing money. The vault includes: - Real estate lead machines (sold to 2 companies) - Automotive inventory bots…
Just leaked 110+ plug-and-play n8n templates that multiple industries are paying me $10K+ for. Your weekend project: Pick any industry, copy-paste a workflow, start printing money. The vault includes: - Real estate lead machines (sold to 2 companies) - Automotive inventory bots…
United States Trends
- 1. #SmackDown 33.6K posts
- 2. Caleb Wilson 4,019 posts
- 3. Giulia 11.2K posts
- 4. #OPLive 1,183 posts
- 5. Lash Legend 4,043 posts
- 6. #TheLastDriveIn 1,661 posts
- 7. Chelsea Green 4,828 posts
- 8. #BostonBlue 1,609 posts
- 9. Reed 24.8K posts
- 10. Darryn Peterson 2,054 posts
- 11. Kansas 22.8K posts
- 12. Rockets 17.9K posts
- 13. Supreme Court 159K posts
- 14. Sengun 3,675 posts
- 15. #Dateline N/A
- 16. Harrison Barnes N/A
- 17. End of 3rd 1,388 posts
- 18. Nia Jax 2,663 posts
- 19. End 3Q N/A
- 20. Dizzy 12.4K posts
You might like
-
BSides London
@BSidesLondon -
Beau Bullock
@dafthack -
Sophia 🦊
@spookphia -
Ethical Hacker
@offethhacker -
Mark C.
@LargeCardinal -
Jim Nitterauer 🇺🇸🇮🇱
@JNitterauer -
Kate Brew
@securitybrew -
Josh Lemon
@joshlemon -
ˢᶜᵒᵗᵗ
@Carp_704 -
Andy Gill
@ZephrFish -
Lorenzo
@2BitsEnd0xDEA -
DTM
@dtmsecurity -
Chris Hanlon
@ChrisHanlonCA -
Scriptmonkey_
@scriptmonkey_ -
Stu Kennedy
@NoobieDog
Something went wrong.
Something went wrong.