Tootfinder

Opt-in global Mastodon full text search. Join the index!

@bogo@hapyyr.com
2025-05-15 14:53:10

#cybersecurity

@deepthoughts10@infosec.exchange
2025-07-15 12:43:57

I learned something new today—threat actors are using AWS Lambda URLs for C2. Lambda is an ephemeral serverless function service from AWS. They have different URL endpoints in the different AWS regions. One example is: <uniquename>.lambda-url.ap-southeast-1.on[.]aws
Something you may want to hunt for. #cybersecurity

@adulau@infosec.exchange
2025-07-09 14:51:22

In a result of its research investigation efforts, Security Explorations, a research lab of AG Security Research company, conducted security analysis of eSIM technology.
#esim #cybersecurity #mobilesecurity

@Xavier@infosec.exchange
2025-06-23 15:18:22

Here's the #CFP for the 2025 #ICS #Cybersecurity Conference. The conference is Oct 27-30 at InterContinental Buckhead Atlanta.

@ErikJonker@mastodon.social
2025-06-10 07:43:52

Voor de liefhebbers. Nederland loopt achter bij de implementatie van NIS2, lees er meer over in deze beslisnota.
#cybersecurity

@deepthoughts10@infosec.exchange
2025-07-10 12:58:13

This looks like an awesome free tool from Microsoft to help guide an organization through a zero trust assessment, and to help keep track of your progress. #cybersecurity
From: @…

@bogo@hapyyr.com
2025-05-30 08:00:02

Behold :) My new #cybersecurity talk is ready and you can see it in the best events around you.
Title: The archetypes of the attackers.
Summary: This talk will lead you on a journey to discover the archetypes of attackers, the tools they use, their motivations for targeting what you've built, and how a geopolitical shift can alter their interest in your resources.

@digitalnaiv@mastodon.social
2025-06-25 14:01:16

Das BSI warnt: Immer weniger Menschen nutzen 2FA und sichere Passwörter, obwohl Cybergefahren steigen. Nur 34% setzen auf 2FA, Updates werden vernachlässigt, Firewalls sind out. Die Argumentation des BSI ist klar: Wer sich schützt, bleibt seltener Opfer. Doch die Bereitschaft (und Unkenntnis) sinkt – fatal! #Cybersecurity

@deepthoughts10@infosec.exchange
2025-06-09 17:53:33

And this is why I read the comments sections on all of @… articles 😄 #cybersecurity

Brian Krebs smacking someone down in his comments section
@deepthoughts10@infosec.exchange
2025-07-09 13:10:50

Do you invest in #crypto or are you a public figure? You should take action to prevent a SIM swap attack. #cybersecurity
From: @…

@adulau@infosec.exchange
2025-06-25 20:06:26

We had the pleasure of presenting at FIRST.org 2025, showcasing the Vulnerability-Lookup and GCVE.eu initiatives.
Slides are now available.
#cybersecurity #vulnerability #cve

@deepthoughts10@infosec.exchange
2025-07-08 13:04:29

These one-pagers on common AiTM phishing kits are great! #cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-06-08 22:58:32

Microsoft has a new blog post on securing your organization against the Golden SAML attack. I wasn't familiar with this attack and learned that it only applies to organizations who use a delegated IdP like Active Directory Federation Services (ADFS). If you use ADFS, this should be on your reading list. #cybersecurity

@deepthoughts10@infosec.exchange
2025-07-08 22:20:38

More than a decent intro — this article brings most publicly available #threatintel about Scattered Spider together in one comprehensive article. It’s a great read with a lot of technical information for those that like that sort of thing. #cybersecurity
From: @…

@ErikJonker@mastodon.social
2025-06-26 12:53:42

Allemaal snel updaten die Cisco routers.
#cybersecurity

@deepthoughts10@infosec.exchange
2025-06-01 20:40:10

DNSFilter, a #cybersecurity vendor I'm not very familiar with, published their Q1 2025 Threat Report. I think it's always good to review these reports from a #threatintel perspective.
Here's their list of TLD's with domains most likely to be malicious:
.tf

@deepthoughts10@infosec.exchange
2025-05-30 22:31:16

This is awesome!
#cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-05-28 12:50:37

LAUNDRY BEAR
#cybersecurity
From: @…
infose…

@deepthoughts10@infosec.exchange
2025-07-08 22:29:53

Do you use #Okta? If so, I highly recommend a defensive domain registration to help protect your org. Register yourdomain-okta.com as that is frequently used by a very successful threat actor. If that domain is already registered and your org didn’t register it? Watch out! Read the below article for more details.

@deepthoughts10@infosec.exchange
2025-05-28 00:57:38

Often disrupting a single link in the infection chain can prevent malware from landing on a system. This is, of course, the Kill Chain concept. You can kill two links in the Katz Stealer chain by blocking msbuild.exe and cmstp.exe, neither of which are used by most people.
#cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-06-24 12:57:38

I had no idea Microsoft PowerToys had a built in data exfil tool. #cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-05-28 00:34:38

Ever hear of the legitimate file sharing service files.catbox[.]moe? It’s really uncommon and you should probably block it in your environment.
Read Palo Alto’s overview of a DarkCloud Steamer campaign that makes use of a catbox.moe file share to distribute its payload here.
#cybersecurity #threatintel

@adulau@infosec.exchange
2025-05-22 18:12:59

The VLAI severity model is doing great with #Ivanti ;-)
#vulnerability #cybersecurity #opensource

= vulnerability.circl.lu C
5: vulnerability p—
-lookup a

CVE-2025-4427 (GCVE-0-2025-

4427)

Vulnerability from cvelistvb

Published

2025-05-13 15:45

Modified

2025-05-21 03:55

Severity ?

5.3 (Medium) -

CVSS:3.1/AV:N/AC:L/PRIN/UIIN/S:U/C:L/IIN/A:

N

VLAI Severity ?

EPSS score ?

61.10% (0.98181)

Summary

An authentication bypass in the API

component of lvanti Endpoint Manager

Mobile 12.5.0.0 and prior allows attackers to

access protected resources without proper

credentials via the…
@deepthoughts10@infosec.exchange
2025-06-06 02:15:55

Has anyone ever tried to trick malware into thinking the host it’s running on is in Russia? For example, reverse engineering and then spoofing the ip-api.com api to always return “RU” on your network. This seems like the kind of trickery that @… would try. 😃

@deepthoughts10@infosec.exchange
2025-06-23 00:33:15

This article from @… is called "When legitimate tools go rogue" but could have easily been named "Know your environment" instead. It's one of my #cybersecurity maxims: the better you understand your environment the better you …

@deepthoughts10@infosec.exchange
2025-05-23 20:47:30

Another good deep dive into how some of these #ClickFix campaigns work, with #ioc included
#cybersecurity
From: @…

@deepthoughts10@infosec.exchange
2025-06-23 00:57:32

I don't know who uses #Citrix Netscalers any longer, but if you do, you've got some work to do to ensure that they are secure. The post describes the work you have to do -- in addition to applying the appropriate patches -- to address recent vulnerabilities. #cybersecurity