
2025-06-23 15:18:22
Here's the #CFP for the 2025 #ICS #Cybersecurity Conference. The conference is Oct 27-30 at InterContinental Buckhead Atlanta.
Here's the #CFP for the 2025 #ICS #Cybersecurity Conference. The conference is Oct 27-30 at InterContinental Buckhead Atlanta.
This article from @… is called "When legitimate tools go rogue" but could have easily been named "Know your environment" instead. It's one of my #cybersecurity maxims: the better you understand your environment the better you …
Another good deep dive into how some of these #ClickFix campaigns work, with #ioc included
#cybersecurity
From: @…
I don't know who uses #Citrix Netscalers any longer, but if you do, you've got some work to do to ensure that they are secure. The post describes the work you have to do -- in addition to applying the appropriate patches -- to address recent vulnerabilities. #cybersecurity
The VLAI severity model is doing great with #Ivanti ;-)
#vulnerability #cybersecurity #opensource
🛡️ DAY 1 at GÉANT #SecurityDays | “Trust is Everything”
An inspiring start in Prague with 150 participants! Alf Moens opened on the shifting #cybersecurity landscape shaped by #AI & geopolitics.…
Voor de liefhebbers. Nederland loopt achter bij de implementatie van NIS2, lees er meer over in deze beslisnota.
#cybersecurity
Behold :) My new #cybersecurity talk is ready and you can see it in the best events around you.
Title: The archetypes of the attackers.
Summary: This talk will lead you on a journey to discover the archetypes of attackers, the tools they use, their motivations for targeting what you've built, and how a geopolitical shift can alter their interest in your resources.
And this is why I read the comments sections on all of @… articles 😄 #cybersecurity
Microsoft has a new blog post on securing your organization against the Golden SAML attack. I wasn't familiar with this attack and learned that it only applies to organizations who use a delegated IdP like Active Directory Federation Services (ADFS). If you use ADFS, this should be on your reading list. #cybersecurity
Is there a self hosted Just In Time (JIT) PAM service?
#AskFedi #JIT #SelfHost #HomeLab #Cybersecurity
DNSFilter, a #cybersecurity vendor I'm not very familiar with, published their Q1 2025 Threat Report. I think it's always good to review these reports from a #threatintel perspective.
Here's their list of TLD's with domains most likely to be malicious:
.tf
This is awesome!
#cybersecurity
From: @…
https://
LAUNDRY BEAR
#cybersecurity
From: @…
https://infose…
ATM PINs leaked! Check if yours is on the list.
#Cybersecurity #DataLeak
https://limewire.com/d/tLQTy#P2blMeIL1H
Often disrupting a single link in the infection chain can prevent malware from landing on a system. This is, of course, the Kill Chain concept. You can kill two links in the Katz Stealer chain by blocking msbuild.exe and cmstp.exe, neither of which are used by most people.
#cybersecurity
From: @…
Ever hear of the legitimate file sharing service files.catbox[.]moe? It’s really uncommon and you should probably block it in your environment.
Read Palo Alto’s overview of a DarkCloud Steamer campaign that makes use of a catbox.moe file share to distribute its payload here.
#cybersecurity #threatintel