๐ŸŽฎ The Return of Malware & Monsters: Collaborative IR Gaming (2h Workshop) on May 6th!

๐—š๐—ข๐—ง๐—ง๐—” ๐—–๐—ข๐—ก๐—ง๐—”๐—œ๐—ก '๐—˜๐—  ๐—”๐—Ÿ๐—Ÿ: ๐—–๐—ข๐—Ÿ๐—Ÿ๐—”๐—•๐—ข๐—ฅ๐—”๐—ง๐—œ๐—ฉ๐—˜ ๐—œ๐—ก๐—–๐—œ๐——๐—˜๐—ก๐—ง ๐—ฅ๐—˜๐—ฆ๐—ฃ๐—ข๐—ก๐—ฆ๐—˜ ๐—ง๐—ฅ๐—”๐—œ๐—ก๐—œ๐—ก๐—š ๐—ง๐—›๐—ฅ๐—ข๐—จ๐—š๐—› ๐—š๐—”๐— ๐—œ๐—ก๐—š with Klaus Agnoletti (@klausagnoletti) & ๐—š๐—Ÿ๐—˜๐—ก ๐—ฆ๐—ข๐—ฅ๐—˜๐—ก๐—ฆ๐—˜๐—ก - 6 May, 9AM - 11AM

Back by popular demand after last year's hit! Ditch dull tabletops for Malware & Monsters โ€“ tabletop RPG meets creature-collecting where teams hunt/contain digital threats in story-driven scenarios with MITRE ATT&CK-mapped malware "malmons." Experience real IR chaos: coordination under pressure, incomplete intel, stakeholder drama. Take roles like Hunter, Analyst, Forensicator, Communicator to see how teams actually collaborate. Learn mechanics, build custom scenarios from real malware history, run live sims with "type effectiveness" for defenses and evolution for escalating attacks. Walk away with free, ready-to-use materials for fun, effective IR training.

Led by Klaus Agnoletti https://pretalx.com/orga/event/bsidesluxembourg-2026/speakers/SQVVHK/ (infosec pro since 2004, BSides Kรธbenhavn co-founder, storytelling cyber advisor, neurodiversity advocate) & Glen Sorensen https://pretalx.com/orga/event/bsidesluxembourg-2026/speakers/J3PRCC/ (Recovering CISO, DeleteMe Solutions Engineer, OSINT/AI expert, HackBack Gaming Incident Master).

๐Ÿ“… Conference dates and time: 6โ€“8 May 2026 | 9AM - 6PM
๐Ÿ“ Venue: 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

Game your way to better IR skills โ€“ popular return engagement! ๐ŸŽฒ

#BSidesLuxembourg2026 #IncidentResponse #CyberSecurityTraining #BlueTeam #GameBasedLearning #MITREATTACK #BSides #DnD #DFIR

If the Kardashians launched their own framework it would be Kommand and Kontrol (K2).

The Momager (Kris.exe or Kris.sh): The primary C2 listener.
The Glow Up: Privesc
Keeping Up: Lateral movement

#C2Framework #RedTeaming #PostExploitation #MalwareDevelopment #Infosec #CyberSecurity #EDRBypass #ActiveDirectory #PenTesting #ThreatHunting #MITREATTACK #APTHunting #Shellcode #ZeroDay #Persistence #Exfiltration #BlueTeam #PurpleTeaming #kardashians

Why the MITRE ATT&CK Framework Actually Works

The alert goes off at 2:17 p.m.

Medium

Learn How Malware Survives Reboots and Cleanup Using Cron Persistence Technique in Linux Systems.

Full Details Here: https://ostechnix.com/cron-persistence-linux-malware/

#CronPersistence #Malware #Cronjob #Cron #LinuxSecurity #MitreAttack #Linux

Cron Persistence: Why Your Linux Malware Keeps Coming Back (Complete Guide 2025) - OSTechNix

Cron persistence is a common Linux malware technique. Learn how it works, how to detect it, and how to remove malicious cron jobs safely.

OSTechNix

A red-team wiper emulating Sandworm (GRU Unit 74455) has been published - a 90-line Go binary demonstrating LotL execution across 121 MITRE ATT&CK techniques including T1490, T1561.001, and T1070.001.

Full report:
https://www.technadu.com/sandworm-gru-unit-74455-red-team-wiper-released-as-training-sample/614498/

Follow @technadu for more threat intel updates.

#Sandworm #GRU74455 #MITREATTACK #RedTeam #BlueTeam #Infosec #WiperMalware

Red and blue teams breaking down their silos and working in real timeโ€”imagine a cybersecurity defense that evolves with every simulated threat. Curious how continuous purple teaming is rewriting the playbook?

https://thedefendopsdiaries.com/continuous-purple-teaming-a-collaborative-approach-to-modern-cyber-defense/

#purpleteaming
#cyberdefense
#breachandattacksimulation
#mitreattack
#redteam
#blueteam
#securityautomation
#continuousvalidation
#cybersecuritystrategy

Continuous Purple Teaming: A Collaborative Approach to Modern Cyber Defense

Explore continuous purple teamingโ€”a collaborative, automated approach that unites red and blue teams for agile, real-time cyber defense and improvement.

The DefendOps Diaries

๐Ÿš€ MITRE ATT&CK v18 = a major leap in detection depth.

The new version adds Detection Strategies and Analytics - helping defenders align detection logic to platform-specific threats.

Also new: CI/CD, Kubernetes, ransomware prep behaviors, mobile โ€œlinked devicesโ€ exploits, and ICS asset updates.

MITRE even launched the ATT&CK Advisory Council to strengthen community collaboration.

๐Ÿ’ฌ What part of ATT&CK v18 do you think will have the biggest impact on detection engineering?
Follow @technadu for more #ThreatIntel insights.

#CyberSecurity #MITREATTACK #DetectionEngineering #CTI #ThreatIntel #BlueTeam #Infosec #CyberDefense #MITRE #ICS #CloudSecurity #MobileSecurity

New phishing technique - CoPhish - weaponizes Microsoft Copilot Studio to steal Entra ID OAuth tokens.
Attackers build malicious AI agents hosted on legitimate Microsoft domains, exfiltrating tokens via โ€œLoginโ€ flows that appear genuine.
Uses OAuth T1528 techniques + token forwarding through Microsoft IPs for stealth.
๐Ÿ›ก๏ธ Detection ideas:
- Monitor consent grants in Entra ID logs.
- Restrict unverified app registrations.
- Disable user app creation.
- Flag Copilot bots using trial tenants or untrusted domains.

How are you tuning detections for AI-driven OAuth phishing?
๐Ÿ’ฌ Share your strategies & follow @technadu for more technical threat intel.

#OAuth #Phishing #Microsoft #Copilot #CloudSecurity #ThreatHunting #AIsecurity #EntraID #MITREATtack #InfoSec #TechNadu

KillChainGraph โ†’ new ML framework mapping attacker behavior w/ Cyber Kill Chain + MITRE ATT&CK.
๐Ÿ”น Ensemble ML: BERT, Transformers, GNN, LightGBM
๐Ÿ”น Outputs graphs of attack paths
๐Ÿ”น Helps analysts anticipate adversary moves
๐Ÿ’ฌ Should SOCs embrace predictive ML, or does analyst intuition still matter most?
Follow @technadu for more cyber insights.

#CyberSecurity #MITREATTACK #CyberKillChain #MachineLearning #SOC #ThreatIntel

Hackers are using everyday system functions to keep malware lurking long after a reboot. Learn how these stealth tactics work and how smart defenses can finally break their grip.

https://thedefendopsdiaries.com/understanding-and-defending-against-malware-persistence-techniques/

#malware
#cybersecurity
#persistence
#wazuh
#mitreattack

Understanding and Defending Against Malware Persistence Techniques

Explore malware persistence techniques and learn defense strategies with Wazuh's security solutions.

The DefendOps Diaries