If the Kardashians launched their own framework it would be Kommand and Kontrol (K2).

The Momager (Kris.exe or Kris.sh): The primary C2 listener.
The Glow Up: Privesc
Keeping Up: Lateral movement

#C2Framework #RedTeaming #PostExploitation #MalwareDevelopment #Infosec #CyberSecurity #EDRBypass #ActiveDirectory #PenTesting #ThreatHunting #MITREATTACK #APTHunting #Shellcode #ZeroDay #Persistence #Exfiltration #BlueTeam #PurpleTeaming #kardashians

Russian hackers have upped the stealth game—embedding malware in ultra-light Linux VMs via Hyper-V to sidestep detection. Could your systems catch this modern tactic?

https://thedefendopsdiaries.com/russian-hackers-exploit-hyper-v-to-hide-malware-in-lightweight-linux-vms/

#hyperv
#linuxsecurity
#malwareevasion
#virtualization
#cyberattack
#curlycomrades
#edrbypass
#infosec
#threatdetection

Crypto24 ransomware isn’t playing by the old rules—it's blending legit software with stealth tools to dodge even the best defenses. Could you be next on its hit list?

https://thedefendopsdiaries.com/crypto24-ransomware-a-new-era-of-cyber-threats/

#crypto24ransomware
#cybersecurity
#ransomware
#edrbypass
#cyberthreats

Crypto24 Ransomware: A New Era of Cyber Threats

Explore Crypto24 ransomware's stealth tactics and global impact, highlighting the need for advanced cybersecurity measures.

The DefendOps Diaries
New "Bring Your Own Installer" EDR bypass used in ransomware attack

A new "Bring Your Own Installer" EDR bypass technique is exploited in attacks to bypass SentinelOne's tamper protection feature, allowing threat actors to disable endpoint detection and response (EDR) agents to install the Babuk ransomware.

BleepingComputer

🎙️✨ Here is a new Brand Story!

Guest: John Stigerwalt & Gregory Hatcher
Episode Title: No Manuals, No Shortcuts: Inside the Offensive Security Mindset at White Knight Labs

🚀 Marco Ciappelli and Sean Martin, CISSP are back — and this time, they’re chatting with the founders of White Knight Labsfor their first Brand Story with ITSPmagazine!

From learning on the field to building red teams to one of the toughest certification programs — John and Greg aren’t just playing the cybersecurity game. They’re rewriting it.

They don’t believe in cookie-cutter pen tests.
They simulate real ransomware attacks.
They write their own loaders.
And they only resell products they’ve personally tested in the wild.

🔥 Passion.
🔍 Precision.
🤝 Purpose.

🎧 Listen or watch now — and meet the team that’s raising the bar for offensive security:
📺 Video Teaser: https://youtu.be/VdGyPFhLAvU
👉 Full Podcast: https://brand-stories-podcast.simplecast.com/episodes/no-manuals-no-shortcuts-inside-the-offensive-security-mindset-at-white-knight-labs-a-white-knight-labs-brand-story-with-co-founders-john-stigerwalt-and-greg-hatcher

📌 Learn more about White Knight Labs on their Brand Page on ITSPmagazine:
https://www.itspmagazine.com/directory/white-knight-labs

🎉 Join us in welcoming White Knight Labs to the ITSPmagazine family!
We already have three more conversations scheduled with them — you won’t want to miss what’s coming next.

Be sure to follow White Knight Labs and the Brand Stories with Sean and Marco podcast to stay connected with this exciting journey.

https://brand-stories-podcast.simplecast.com/

#penetrationtesting #redteam #ransomwaresimulation #offensivesecurity #edrbypass #cybersecuritytraining #whiteknightlabs #apt #cybersecurityservices #defcon #ransomware #pentesting #redteam #hacking #securitypartnerships #infosec #infosecurity

teaser Cybersecurity Insights: Understanding Threat Actors | Brand Story with White Knight Labs

YouTube
In-Memory Execution in macOS: the Old and the New

Technical writeups by Meta’s Security folks, including Red Team.

Meta Red Team X

Sailing Past Security Measures In AD - My blogpost about bypassing AV / EDR:

https://luemmelsec.github.io/Circumventing-Countermeasures-In-AD/

#pentest #redteam #avbypass #edrbypass #activedirectory #ad

LuemmelSec - Blog

Today we´re going to talk a little about possible ways to circumvent some of the security measures one might face during an engagement in an Active Directory environment. We as pentesters are heavily relying on our tools like Bloodhound, Rubeus, mimikatz and all the other fancy stuff. Be it for an internal assessment or a Red Team campaign. But the Blue Team is not at sleep, trying to keep the bad guys outside with their newest AI machine learning cyber tools.