harrychewys's profile picture. #new

harrychew

@harrychewys

#new

harrychew reposted

🔥 BYPASS WINDOWS DEFENDER XOR-obfuscate a Sliver C2 payload on Kali, forge a stealth C++ loader, and drop a reverse shell on Win10 in seconds. OUT NOW: youtu.be/lC9zh3_S-zg

Cyb3rMaddy's tweet image. 🔥 BYPASS WINDOWS DEFENDER

XOR-obfuscate a Sliver C2 payload on Kali, forge a stealth C++ loader, and drop a reverse shell on Win10 in seconds.

OUT NOW: 
youtu.be/lC9zh3_S-zg

harrychew reposted

We’re seeing a clear trend: attackers are bypassing the endpoint entirely. Not just avoiding traditional EDR-monitored systems by pivoting to embedded and edge devices, but now also operating purely in the cloud. No shell, no malware, no persistence on the endpoint. Just an OAuth…

.@Volexity #threatintel: Multiple Russian threat actors are using Signal, WhatsApp & a compromised Ukrainian gov email address to impersonate EU officials. These phishing attacks abuse 1st-party Microsoft Entra apps + OAuth to compromise targets. volexity.com/blog/2025/04/2… #dfir



harrychew reposted

Critical vulnerability (CVE-2024-9956) in Chrome’s WebAuthn on Android allowed attackers to hijack PassKeys via Bluetooth. The vulnerability stemmed from an improper implementation in Chrome’s WebAuthentication API handling: offs.ec/4j9TcvP


harrychew reposted

Read “New Ransomware Tactic: Adversaries Target ESXi Servers” in the @CrowdStrike blog → bit.ly/2NB2xnm #cybersecurity

CrowdStrike's tweet image. Read “New Ransomware Tactic: Adversaries Target ESXi Servers” in the @CrowdStrike blog → bit.ly/2NB2xnm #cybersecurity

United States Trends

Loading...

Something went wrong.


Something went wrong.