The Mire is a defensive security system that shifts the economics of attack. Clients that ignore server directives are treated as hostile and met with cost and confusion—wasting time, compute, and analysis while serving convincingly real noise. #infosec #defensivesecurity

https://mire.cc/welcome-to-the-mire/

https://podverse.fm/episode/S224ePoTN Great episode #defensivesecurity podcast , no I’m not advertising Podverse it’s just what I use.
Defensive Security Podcast Episode 331B - Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

Reposting Episode 331 due to the wrong mp3 attached to the original. Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/ / https://www.bleepingcomputer.com/news/security/anthropic-claims-of-claude-ai-automated-cyberattacks-met-with-doubt/ https://www.theregister.com/2025/11/14/selfreplicating_supplychain_attack_poisons_150k/ https://cyberscoop.com/fortinet-delayed-disclosure-exploited-vulnerability/ https://www.bleepingcomputer.com/news/security/piecing-together-the-puzzle-a-qilin-ransomware-investigation/ Repo Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/ / https://www.bleepingcomputer.com/news/security/anthropic-claims-of-claude-ai-automated-cyberattacks-met-with-doubt/ https://www.theregister.com/2025/11/14/selfreplicating_supplychain_attack_poisons_150k/ https://cyberscoop.com/fortinet-delayed-disclosure-exploited-vulnerability/ https://www.bleepingcomputer.com/news/security/piecing-together-the-puzzle-a-qilin-ransomware-investigation/

Podverse

The decades-old Finger protocol is being abused in new ClickFix malware campaigns. Attackers are using Finger to pull remote commands onto Windows systems, leading to Python-based malware or NetSupport RAT infections. Newer variants even check for analysis tools before execution.

Anyone else seeing Finger traffic or legacy protocol misuse recently?
Follow for more updates.

#Malware #ClickFix #InfoSec #ThreatIntel #WindowsSecurity #CyberSecurity #RAT #LegacyProtocols #DefensiveSecurity

Attackers are targeting Azure Blob Storage in complex multi-stage campaigns — reminding us that cloud data needs active defense, not blind trust. ☁️🛡️ #CloudSecurity #DefensiveSecurity

https://www.microsoft.com/en-us/security/blog/2025/10/20/inside-the-attack-chain-threat-activity-targeting-azure-blob-storage/

Inside the attack chain: Threat activity targeting Azure Blob Storage | Microsoft Security Blog

Azure Blob Storage is a high-value target for threat actors due to its critical role in storing and managing massive amounts of unstructured data at scale across diverse workloads and is increasingly targeted through sophisticated attack chains that exploit misconfigurations, exposed credentials, and evolving cloud tactics.

Microsoft Security Blog

Lobot: Cyborg responsible for systems and operations with unclear motives and allegiances.
Atom Eins: Cyborg responsible for systems and operations with unclear motives and allegiances.
Jerry Bell (@jerry): ...

#AlienEarth #StarWars #EmpireStrikesBack #DefensiveSecurity

📋 Server Security Checklist — Essential Hardening Guide 🛡️

Securing servers is critical to protect sensitive data, applications, and networks. Here’s a quick checklist every sysadmin and security engineer should follow to reduce risk and strengthen resilience. ⚡🔐

1️⃣ System & OS Hardening
🔹 Keep OS and packages updated (apply patches regularly).
🔹 Remove or disable unused services & software.
🔹 Configure secure boot and BIOS/UEFI passwords.

2️⃣ Access Control
🔹 Enforce strong passwords + MFA for all accounts.
🔹 Use role-based access (least privilege).
🔹 Disable root/administrator login over SSH/RDP.

3️⃣ Network Security
🔹 Restrict inbound/outbound traffic with firewalls.
🔹 Segment critical servers from general networks.
🔹 Disable unused ports & protocols.

4️⃣ Secure Remote Access
🔹 Use SSH with key-based auth (disable password logins).
🔹 Enforce VPNs for admin access.
🔹 Monitor and log remote sessions.

5️⃣ Logging & Monitoring
🔹 Enable centralized logging (syslog/SIEM).
🔹 Monitor failed login attempts & unusual activity.
🔹 Configure alerts for critical events.

6️⃣ Data Protection
🔹 Encrypt sensitive data at rest & in transit (TLS, disk encryption).
🔹 Regularly back up data to secure, offline storage.
🔹 Apply strict database access policies.

7️⃣ Application & Patch Management
🔹 Keep middleware, frameworks, and apps patched.
🔹 Remove default credentials and sample configs.
🔹 Use secure coding practices.

8️⃣ Malware & Intrusion Defense
🔹 Deploy antivirus/EDR for endpoints.
🔹 Enable IDS/IPS at the network edge.
🔹 Scan regularly for vulnerabilities.

9️⃣ Physical & Cloud Security
🔹 Restrict physical access to server rooms.
🔹 Harden cloud instances with provider tools (security groups, IAM).
🔹 Regularly review cloud audit logs.

🔟 Policy & Compliance
🔹 Apply CIS/NIST benchmarks.
🔹 Document access, configs, and changes.
🔹 Train admins in security best practices.

#ServerSecurity #CyberSecurity #InfoSec #BlueTeam #SysAdmin #ITSecurity #SecurityChecklist #DefensiveSecurity

A HUGE thank you to Mental Health Hacker's first PLATINUM sponsor, @blumirasec

This will enable us to bring even MORE to the @blueteamvillage
this year! Our partnership with BTV will enable us to help bring resources, content, and giveaways at @defcon this year! See ya'll soon!!

A Security Tool Your IT Team Can Actually Use

Blumira simplifies cybersecurity by combining ease of use with powerful protection. We enable teams big and small to defend effectively.

#defcon #defcon33 #blueteam #defensivesecurity #siem #mentalhealth

The Silent Superpower – Cybercrime in 2025

YouTube

🚨 Giveaway Alert: 3 LetsDefend VIP+ Vouchers for 1 Month Access! 🚨

We’re giving away 3 LetsDefend VIP+ vouchers for a free 1-month subscription on 02/01.

What You Need to Do:

1️⃣ Join our Discord Community (https://buff.ly/3Cfy9rT).

#CyberSecurity #BlueTeam #CyberTraining #InfoSec #DefensiveSecurity #ThreatHunting #SOCAnalyst #CyberDefense #SecurityAwareness #BlueTeamTraining

Join the Stats on Stats Discord Server!

Check out the Stats on Stats community on Discord - hang out with 50 other members and enjoy free voice and text chat.

Discord