
2025-08-02 15:15:22
If you are interested in seeing how IDS rules work, or in trying to write your own, take a look to see how an expert does it. #cybersecurity
From: @…
If you are interested in seeing how IDS rules work, or in trying to write your own, take a look to see how an expert does it. #cybersecurity
From: @…
Behold :) My new #cybersecurity talk is ready and you can see it in the best events around you.
Title: The archetypes of the attackers.
Summary: This talk will lead you on a journey to discover the archetypes of attackers, the tools they use, their motivations for targeting what you've built, and how a geopolitical shift can alter their interest in your resources.
DNSFilter, a #cybersecurity vendor I'm not very familiar with, published their Q1 2025 Threat Report. I think it's always good to review these reports from a #threatintel perspective.
Here's their list of TLD's with domains most likely to be malicious:
.tf
Here's the #CFP for the 2025 #ICS #Cybersecurity Conference. The conference is Oct 27-30 at InterContinental Buckhead Atlanta.
We had the pleasure of presenting at FIRST.org 2025, showcasing the Vulnerability-Lookup and GCVE.eu initiatives.
Slides are now available.
#cybersecurity #vulnerability #cve
Das BSI warnt: Immer weniger Menschen nutzen 2FA und sichere Passwörter, obwohl Cybergefahren steigen. Nur 34% setzen auf 2FA, Updates werden vernachlässigt, Firewalls sind out. Die Argumentation des BSI ist klar: Wer sich schützt, bleibt seltener Opfer. Doch die Bereitschaft (und Unkenntnis) sinkt – fatal! #Cybersecurity
This is awesome!
#cybersecurity
From: @…
https://
LAUNDRY BEAR
#cybersecurity
From: @…
https://infose…
Customer guidance for SharePoint vulnerability CVE-2025-53770 | MSRC Blog | Microsoft Security Response Center
#sharepoint #cybersecurity #vulnerability
🔗
Allemaal snel updaten die Cisco routers.
#cybersecurity
If you are a Microsoft Entra ID shop, I highly recommend following this article’s advice on Conditional Access Policy implementation #cybersecurity
From: @…
Just my two cents on the latest malicious AUR packages. This should serve as a reminder to everyone to not install whatever you find on AUR. Be critical, do some due dilligence to verify legimiacy. Check if if what you are looking for exist in pacman first. #cybersecurity #infosec
Often disrupting a single link in the infection chain can prevent malware from landing on a system. This is, of course, the Kill Chain concept. You can kill two links in the Katz Stealer chain by blocking msbuild.exe and cmstp.exe, neither of which are used by most people.
#cybersecurity
From: @…
Ever hear of the legitimate file sharing service files.catbox[.]moe? It’s really uncommon and you should probably block it in your environment.
Read Palo Alto’s overview of a DarkCloud Steamer campaign that makes use of a catbox.moe file share to distribute its payload here.
#cybersecurity #threatintel
In a result of its research investigation efforts, Security Explorations, a research lab of AG Security Research company, conducted security analysis of eSIM technology.
#esim #cybersecurity #mobilesecurity
Incredible if you think about it...
"The bug, when exploited, allows hackers to steal private digital keys from SharePoint servers without needing any credentials to log in. Once in, the hackers can remotely plant malware, and gain access to the files and data stored within"
Big #Microsoft
I had no idea Microsoft PowerToys had a built in data exfil tool. #cybersecurity
From: @…
https://…
This article from @… is called "When legitimate tools go rogue" but could have easily been named "Know your environment" instead. It's one of my #cybersecurity maxims: the better you understand your environment the better you …
Curious about all the open source and projects developed by @… ?
CIRCL Open Source tools powering SOC & CSIRT teams.
#opensource
Another good deep dive into how some of these #ClickFix campaigns work, with #ioc included
#cybersecurity
From: @…
I don't know who uses #Citrix Netscalers any longer, but if you do, you've got some work to do to ensure that they are secure. The post describes the work you have to do -- in addition to applying the appropriate patches -- to address recent vulnerabilities. #cybersecurity
Voor de liefhebbers. Nederland loopt achter bij de implementatie van NIS2, lees er meer over in deze beslisnota.
#cybersecurity
I learned something new today—threat actors are using AWS Lambda URLs for C2. Lambda is an ephemeral serverless function service from AWS. They have different URL endpoints in the different AWS regions. One example is: <uniquename>.lambda-url.ap-southeast-1.on[.]aws
Something you may want to hunt for. #cybersecurity
The VLAI severity model is doing great with #Ivanti ;-)
#vulnerability #cybersecurity #opensource
And this is why I read the comments sections on all of @… articles 😄 #cybersecurity
This looks like an awesome free tool from Microsoft to help guide an organization through a zero trust assessment, and to help keep track of your progress. #cybersecurity
From: @…
These one-pagers on common AiTM phishing kits are great! #cybersecurity
From: @…
https://
Do you invest in #crypto or are you a public figure? You should take action to prevent a SIM swap attack. #cybersecurity
From: @…
Microsoft has a new blog post on securing your organization against the Golden SAML attack. I wasn't familiar with this attack and learned that it only applies to organizations who use a delegated IdP like Active Directory Federation Services (ADFS). If you use ADFS, this should be on your reading list. #cybersecurity
More than a decent intro — this article brings most publicly available #threatintel about Scattered Spider together in one comprehensive article. It’s a great read with a lot of technical information for those that like that sort of thing. #cybersecurity
From: @…
Do you use #Okta? If so, I highly recommend a defensive domain registration to help protect your org. Register yourdomain-okta.com as that is frequently used by a very successful threat actor. If that domain is already registered and your org didn’t register it? Watch out! Read the below article for more details.