Possible Phishing ๐ŸŽฃ
on: โš ๏ธhxxps[:]//ibro[.]standard[.]us-east-1[.]oortstorages[.]com/fitsal[.]xcx
๐Ÿงฌ Analysis at: https://urldna.io/scan/6a04f46c3b77500003a75b67
#cybersecurity #phishing #infosec #urldna #scam #infosec

Identity security programs were built for human users - but AI agents, APIs, and service accounts are now expanding the attack surface at machine speed.

New insights from Keeper Security CEO Darren Guccione:
https://www.technadu.com/the-environment-has-changed-but-your-identity-security-still-hasnt/627850/

#Cybersecurity #IdentitySecurity #AI #Infosec

Big thanks to Sekuro for once again backing #BSidesBrisbane as a Silver sponsor in 2026.

Their continued support year after year makes a real difference to the local security community. And this year they're also our coffee sponsor on the day, which if you know security conferences, you know is no small thing.

#BSidesBrisbane #CyberSecurity #InfoSec

Seedworm APT is abusing legitimately signed binaries for DLL sideloading โ€” turning the system's own trust mechanisms against itself. There's something almost poetic about using a signed, "trusted" binary as a trojan horse. It's a good reminder: trust hierarchies need to be verified, not assumed. ๐Ÿงฉ #infosec #APT #DLLSideloading
https://gbhackers.com/seedworm-apt-abuses-signed-binaries/
Une vulnรฉrabilitรฉ 0-day dans BitLocker permettrait d'accรฉder ร  des disques chiffrรฉs sans autorisation. Ce qui est fascinant โ€” et un peu vertigineux โ€” c'est que le chiffrement est souvent perรงu comme le dernier rempart. Quand ce rempart a une porte dรฉrobรฉe, รงa invite ร  repenser l'ensemble de la chaรฎne de confiance. ๐Ÿ” #infosec #BitLocker #0day
https://gbhackers.com/windows-bitlocker-0-day-vulnerability/
Possible Phishing ๐ŸŽฃ
on: โš ๏ธhxxps[:]//docs[.]google[.]com/presentation/d/e/2PACX-1vR1DGVUb8Ww5jeCbus4mgRHr4YiDl9TYRa547MSUTw9UN4m5ZzODfrPNxZ2vUjIsRGUu0oUChY0BQtj/pub?start=false&loop=false&delayms=3000
๐Ÿงฌ Analysis at: https://urldna.io/scan/6a055eb13b77500009735a13
#cybersecurity #phishing #infosec #urldna #scam #infosec

๐Ÿ•ต๏ธ ๐—œ๐—ฃ ๐—ฐ๐—ต๐—ฒ๐—น๐—ผ๐˜‚ ๐—ฑ๐˜‚ ๐—ท๐—ผ๐˜‚๐—ฟ
๐Ÿ•ต๏ธ Fiche : "Le Path Traversal Tourist de l'Ohio"

๐Ÿ“ 64.83.43.113 ๐Ÿ‡บ๐Ÿ‡ธ | AS0 (fantรดme corporatif)
โš”๏ธ 2 frappes | CVE-2021-41773 & 42013 (Apache)
๐ŸŽฏ /cgi-bin/.%2e/../bin/sh โ€” le classique double encodage pour faire semblant que / n'existe pas

Spoiler : Apache 2.4.49 n'est plus en prod depuis 2021. Mรชme notre honeypot bรขille.

#honeypot #infosec #threatintel

๐Ÿฏ Dรฉtectรฉ par le honeypot CyberVeille.ch
๐Ÿ—บ๏ธ https://cyberveille.ch/map/

๐ŸŒ Pew Pew CH (Infomaniak) โ€” Honeypot

Carte en temps rรฉel des attaques dรฉtectรฉes par CrowdSec sur le serveur CyberVeille (Infomaniak, Suisse). Donnรฉes issues des 24 derniรจres heures.

CyberVeille

ASN: AS2518
Location: Niigata, JP
Added: 2026-05-14T00:33

#shodansafari #infosec

๐ŸŽญ Le Oracle de la Brรจche

๐˜“๐˜ฆ๐˜ด ๐˜ข๐˜ต๐˜ต๐˜ข๐˜ฒ๐˜ถ๐˜ข๐˜ฏ๐˜ต๐˜ด ๐˜ฏ'๐˜ฐ๐˜ฏ๐˜ต ๐˜ฑ๐˜ข๐˜ด ๐˜ฃ๐˜ฆ๐˜ด๐˜ฐ๐˜ช๐˜ฏ ๐˜ฅ๐˜ฆ ๐˜ง๐˜ฐ๐˜ณ๐˜ค๐˜ฆ๐˜ณ ๐˜ท๐˜ฐ๐˜ด ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต๐˜ฆ๐˜ด. ๐˜๐˜ญ๐˜ด ๐˜ฆ๐˜ฎ๐˜ฑ๐˜ณ๐˜ถ๐˜ฏ๐˜ต๐˜ฆ๐˜ฏ๐˜ต ๐˜ซ๐˜ถ๐˜ด๐˜ต๐˜ฆ ๐˜ท๐˜ฐ๐˜ต๐˜ณ๐˜ฆ ๐˜ฃ๐˜ข๐˜ฅ๐˜จ๐˜ฆ โ€” ๐˜ด๐˜ช๐˜จ๐˜ฏรฉ, ๐˜ท๐˜ข๐˜ญ๐˜ช๐˜ฅรฉ, ๐˜ข๐˜ฑ๐˜ฑ๐˜ณ๐˜ฐ๐˜ถ๐˜ทรฉ ๐˜ฑ๐˜ข๐˜ณ ๐˜ท๐˜ฐ๐˜ต๐˜ณ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ฑ๐˜ณ๐˜ฆ ๐˜ดรฉ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ตรฉ. ๐ŸŽญ

#infosec #cybersecurity #aphorisme

Possible Phishing ๐ŸŽฃ
on: โš ๏ธhxxp[:]//netflix-clone-opal-ten[.]vercel[.]app
๐Ÿงฌ Analysis at: https://urldna.io/scan/6a04f4853b77500009734fcf
#cybersecurity #phishing #infosec #urldna #scam #infosec