lazysecurity's profile picture. SecOps, Detection Engineering & Threat Modelling. Husband. Dad. Veteran. Ex BSidesLDN organiser. Antiracist. LGBTQ+ Ally. He/Him. http://infosec.exchange/@lazysecurity

Paul Batson @[email protected]

@lazysecurity

SecOps, Detection Engineering & Threat Modelling. Husband. Dad. Veteran. Ex BSidesLDN organiser. Antiracist. LGBTQ+ Ally. He/Him. http://infosec.exchange/@lazysecurity

置頂

I’m bsky.app/profile/paulba… on Blue Sky if anyone is there too. Seems a lot of people making the move. I’m also still on Mastodon too as infosec.exchange/web/@lazysecur…


Paul Batson @[email protected] 已轉發

Ladies and gentlemen, we present to you Conti Ransomware group 💀

IntCyberDigest's tweet image. Ladies and gentlemen, we present to you Conti Ransomware group 💀

Paul Batson @[email protected] 已轉發

Windows Defender blocks any procdump execution referencing "lsass" on the command line (1️⃣) Simply querying lsass' process ID and using this instead bypasses this somewhat naive detection (2️⃣) Even simpler? Use lsass' service name, "KeyIso" 🤷 (3️⃣)

Wietze's tweet image. Windows Defender blocks any procdump execution referencing "lsass" on the command line (1️⃣)

Simply querying lsass' process ID and using this instead bypasses this somewhat naive detection (2️⃣)

Even simpler? Use lsass' service name, "KeyIso" 🤷 (3️⃣)

Paul Batson @[email protected] 已轉發

BREAKING: The Chinese vessel Yi Peng 3 has been chased, intercepted, and boarded by Danish Navy vessel Y311 Søløven after the Chinese vessel destroyed 2 undersea telecom cables linking Finland-Germany and Sweden-Lithuania. The vessel sailed from Russia & the captain is Russian

visegrad24's tweet image. BREAKING:

The Chinese vessel Yi Peng 3 has been chased, intercepted, and boarded by Danish Navy vessel Y311 Søløven after the Chinese vessel destroyed 2 undersea telecom cables linking Finland-Germany and Sweden-Lithuania.

The vessel sailed from Russia & the captain is Russian

Paul Batson @[email protected] 已轉發

in today's 'no way, is it real?' we found out that Palo Alto's PAN-OS CVE-2024-0012 and CVE-2024-9474 were the equivalents of saying 'turn off auth and give me a shell'. Enjoy! labs.watchtowr.com/pots-and-pans-…


Paul Batson @[email protected] 已轉發

All the workshop recordings and slides from #r2con2024 are now edited and published. If you didn't had a chance to attend now it's a good time to catch up starting right from the very first day! 👉 radare.org/con/2024/

radareorg's tweet image. All the workshop recordings and slides from #r2con2024 are now edited and published. If you didn't had a chance to attend now it's a good time to catch up starting right from the very first day! 👉 radare.org/con/2024/

Paul Batson @[email protected] 已轉發

Quick PSA: Someone is attacking Tor right now and has been for a few weeks. The attacker is spoofing the IPs of Tor Exit and Directory nodes, and blasting TCP SYN packets indiscriminately on 22/TCP- spurring a large amount of abuse complaints to hosting providers, which are…


Paul Batson @[email protected] 已轉發

It’s been just over a week since we launched our Free Tier, and the response has been incredible. Here’s a quick look at the impact so far: ✅ 12109 + Total Students Enrolled ✅ 25+ Hours of Free Content Available (with a grand total of over 302,725 hours to all student…

TCMSecurity's tweet image. It’s been just over a week since we launched our Free Tier, and the response has been incredible. 

Here’s a quick look at the impact so far:  
✅ 12109 + Total Students Enrolled 
✅ 25+ Hours of Free Content Available (with a grand total of over 302,725 hours to all student…

Paul Batson @[email protected] 已轉發

In today's WTF?!?!? moment When a ESXi server is domain-joined, it assumes any "ESX Admins" group & its members should have full admin rights. So.... anyone who can create & manage a group in AD, can get full admin rights to the VMware ESX hypervisors! microsoft.com/en-us/security…

PyroTek3's tweet image. In today's WTF?!?!? moment

When a ESXi server is domain-joined, it assumes any  "ESX Admins" group & its members should have full admin rights.

So.... anyone who can create & manage a group in AD, can get full admin rights to the VMware ESX hypervisors!
microsoft.com/en-us/security…

Microsoft has uncovered a vulnerability in ESXi hypervisors, identified as CVE-2024-37085, being exploited by threat actors to obtain full administrative permissions on domain-joined ESXi hypervisors and encrypt critical servers in ransomware attacks. msft.it/6012lbTai



Paul Batson @[email protected] 已轉發

CrowdStrike Preliminary Post Incident Review (PIR) is released: crowdstrike.com/falcon-content…

_JohnHammond's tweet image. CrowdStrike Preliminary Post Incident Review (PIR) is released: crowdstrike.com/falcon-content…

Loading...

Something went wrong.


Something went wrong.