๐Ÿ†• New report from OHIIHO Research

Watcher-NetAI / skn โ€” a Linux SSH botnet observed on two of our honeypot meshes. 10 MB Go scanner with intact DWARF: source tree, module name, capability map, all visible. The loader is hardened; the scanner is not.

โ†’ Stage-2 C2 on connexionlost{net,zip} โ†’ 194[.]5[.]97[.]46

โ†’ Non-root systemd-user persistence (hunting blind spot)

โ†’ Ships YARA + 4 Sigma rules + 34 IOCs + KQL queries

Full report (Part 1/2):
https://research.ohiiho.com/reports/2026-05-watcher-netai-skn/

SOC brief (Part 2/2):
https://research.ohiiho.com/reports/2026-05-watcher-netai-skn-brief/

#ThreatIntel #Linux #SSH #Botnet #DetectionEngineering

going through my old files and cleaning up and came across this infographic that demonstrates how byte_jump works in Snort/Suricata #Snort #Suricata #DetectionEngineering
[DxBP] Part 1 - Technical Detection Engineering Best Practices

Part 1 of the Detection Engineering Best Practices series focuses on the technical foundations of building high quality detections. While examples are written in KQL for Microsoft Sentinel and Defender XDR, the challenges and best practices discussedโ€”such as ingestion delays, identifier usage, joins, evasion-resistant logic, and entity mappingโ€”apply broadly to SIEM and EDR platforms including Splunk, CrowdStrike Falcon, and SentinelOne.

Microsoft Security Blogs - Kusto
Using AI to generate synthetic attack logs for detection engineering โ€” now that's a clever feedback loop. Instead of waiting for real incidents to tune your detections, you simulate the adversary's moves first. Security that learns before it hurts. The future of blue teaming looks genuinely exciting. ๐Ÿ”ต๐Ÿค– #infosec #DetectionEngineering #AI
https://malware.news/t/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation/106934
Accelerating detection engineering using AI-assisted synthetic attack logs generation

In this article Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note: Affiliate link โ€“ your enrollment helps support this platform at no extra cost to you. <div> <div> <ol><li><a href="https://www.microsoft.com/en-us/security/blog/#core-idea-from-ttps-to-logs" rel="noreferrer" target="_blank">Core Idea: From TTPs to Logs</a></li><li><a href="https://...

Malware Analysis, News and Indicators

Most-Wanted Proof-of-Concepts:

Progress MOVEit Automation Authentication Bypass (CVE-2026-4670)

Ivanti EPMM 0day Authenticated Remote Code Execution (CVE-2026-6973)

OpenCTI User Impersonation (CVE-2026-27960)

PAN-OS Unauthenticated Buffer Overflow Vulnerability in User-IDโ„ข Authentication Portal (CVE-2026-0300)

If you know where I can find a PCAP or proof of concept code, let me know.

#DetectionEngineering #Suricata

Updated avenger.rules - Added coverage for CVE-2026-39363) - Vite Dev Server Arbitrary File Read attempt

#DetectionEngineering #Suricata #WebSocket #Exploit

https://github.com/da667/Avenger

GitHub - da667/Avenger: Create rule coverage that closes the gaps.

Create rule coverage that closes the gaps. Contribute to da667/Avenger development by creating an account on GitHub.

GitHub

๐Ÿšจ Crossโ€‘Session Activation is a detection gap hiding in plain sight.
๐Ÿ’ก The technique abstract below highlights the minimum viable signals for defenders.
๐Ÿ’ญ Interesting to know if this technique is part of your threat emulation library.

#detectionengineering #purpleteam #blueteam

โšก Fresh Talk Alert for BSides Luxembourg 2026!

โ€œ๐—œ๐—ก๐—™๐—ข๐—ฆ๐—ง๐—˜๐—”๐—Ÿ๐—˜๐—ฅ ๐—˜๐— ๐—จ๐—Ÿ๐—”๐—ง๐—œ๐—ข๐—ก: ๐—ฉ๐—”๐—Ÿ๐—œ๐——๐—”๐—ง๐—œ๐—ก๐—š ๐——๐—˜๐—ง๐—˜๐—–๐—ง๐—œ๐—ข๐—ก ๐—ข๐—™ ๐—–๐—ฅ๐—˜๐——๐—˜๐—ก๐—ง๐—œ๐—”๐—Ÿ ๐—ง๐—›๐—˜๐—™๐—งโ€ โ€“ ๐—™๐—œ๐—Ÿ๐—œ๐—ฃ๐—œ ๐—ฃ๐—œ๐—ฅ๐—˜๐—ฆ

Infostealers remain one of the most widespread and damaging threats in todayโ€™s cyber landscape. In this practical session, Filipi Pires demonstrates how to emulate real infostealer behavior to test whether your security controls can actually detect credential theft and data exfiltration attempts.

The session includes live demonstrations covering browser credential theft, keylogging, clipboard monitoring, LSASS credential dumping, and validation of DLP and network monitoring controls. Attendees will gain practical insight into how attackers operate โ€” and how defenders can validate their visibility and detection capabilities against modern credential theft techniques.

Filipi Pires is Head of Technical Advocacy at SCYTHE, DEF CON Red Team Village Director, BSides Porto Organizer, and an internationally recognized speaker specializing in red teaming, malware analysis, and offensive security.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule: https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #Infostealer #CredentialTheft #RedTeam #DetectionEngineering #CyberSecurity #BlueTeam #DFIR

โšก Fresh Talk Alert for BSides Luxembourg 2026!

โ€œ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ ๐—™๐—ข๐—ฅ ๐—”๐—œ: ๐—”๐—œ๐——๐—ฅ ๐—•๐—”๐—ฆ๐—ง๐—œ๐—ข๐—ก ๐—”๐—ฆ ๐—ข๐—ฃ๐—˜๐—ก ๐—ฆ๐—ข๐—จ๐—ฅ๐—–๐—˜ ๐—Ÿ๐—Ÿ๐—  ๐—™๐—œ๐—ฅ๐—˜๐—ช๐—”๐—Ÿ๐—Ÿ / ๐—”๐—œ ๐—ฃ๐—ฅ๐—ข๐— ๐—ฃ๐—ง๐—ฆ ๐—ฅ๐—˜๐—ฉ๐—˜๐—ฅ๐—ฆ๐—˜ ๐—ฃ๐—ฅ๐—ข๐—ซ๐—ฌโ€ โ€“ Andrii Bezverkhyi

As AI adoption accelerates, so do the risks โ€” from prompt injections to malicious AI agents and adversarial abuse. This AI Security Village session explores AIDR Bastion, an open-source GenAI protection system designed to secure AI workloads through layered detection and prompt filtering.

The talk covers how AIDR Bastion acts as an LLM firewall and reverse proxy for AI prompts, using Sigma and Roota rules to detect malicious behavior, harmful content, prompt injection attacks, and AI-assisted malware generation. Attendees will also see how the system integrates with MITRE ATLAS, OWASP LLM Top 10 guidance, and existing detection engineering workflows.

Andrii Bezverkhyi is the founder of SOC Prime and a long-time contributor to the threat detection and cybersecurity community, known for projects such as Uncoder and DetectFlow.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule: https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #AISecurity #LLMSecurity #PromptInjection #OWASP #CyberSecurity #DetectionEngineering #OpenSource

La dรฉtection n'est pas un produit fini โ€” c'est un processus vivant. L'article propose d'appliquer un vrai cycle de dรฉveloppement ร  la Detection Engineering : tests, versioning, revues, dรฉprรฉciation.

En somme : traiter ses rรจgles SIEM comme du code. Parce que les attaquants, eux, font รฉvoluer leur code en permanence. ๐Ÿ”

#infosec #DetectionEngineering #BlueTeam
https://malware.news/t/tuned-by-design-why-detection-engineering-needs-its-own-development-lifecycle/106621

Tuned by Design: Why Detection Engineering Needs Its Own Development Lifecycle

We embraced โ€œSecure by Designโ€ in software development. It is time we applied the same philosophy to SOC detection content โ€” introducing the Use Case Development Lifecycle. If you have spent more than a year inside a Security Operations Center, you have lived this story: a brand-new analytic rule goes live on Monday morning. By Tuesday afternoon the SOC is drowning in false positives. An analyst mutes the rule. A month later, a real intrusion slips through the exact blind spot that rule was supp...

Malware Analysis, News and Indicators