A File Format Uncracked for 20 Years: Part 2

I reimplemented your data file loader and all I got were these stupid cut missions

lander's posts

Social Engineering Exposes Vulnerability in Corporate Networks

A clever phone call can be all it takes to breach a corporate network - just ask Brandon Dixon, a former penetration tester who convinced an IT security team to hand over root access by pretending to be their boss. With a simple social engineering trick, Dixon was able to reset his "password" and gain unrestricted access…

https://osintsights.com/social-engineering-exposes-vulnerability-in-corporate-networks?utm_source=mastodon&utm_medium=social

#SocialEngineering #Challengeresponse #MfaBypass #PenetrationTesting #EmergingThreats

Social Engineering Exposes Vulnerability in Corporate Networks

Learn how social engineering exposes corporate network vulnerabilities and discover how to protect your business from devastating attacks - read the expert insights now.

OSINTSights

The Bug Bounty Roadmap I'd Follow If I Started Over (With AI)

https://www.youtube.com/watch?v=kujCmXELWqo

#aisecurity #vulnerability #penetrationtesting

The Bug Bounty Roadmap I'd Follow If I Started Over (With AI)

YouTube
How I Got RCE by Bypassing a JavaScript Sandbox

YouTube
Sorry.

YouTube

iX-Workshop: Active Directory hacken und schützen

Werden Sie selbst zum Hacker und lernen, wie Angreifer gezielt Schwachstellen in Active Directory ausnutzen, um Server und Domänencontroller zu kompromittieren.

https://www.heise.de/news/iX-Workshop-Active-Directory-hacken-und-schuetzen-11280076.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon

#ActiveDirectory #Hacking #IT #iXWorkshops #Microsoft #PenetrationTesting #Security #news

iX-Workshop: Active Directory hacken und schützen

Werden Sie selbst zum Hacker und lernen, wie Angreifer gezielt Schwachstellen in Active Directory ausnutzen, um Server und Domänencontroller zu kompromittieren.

heise online
Now You See Me: AADGraphActivityLogs

KQL hunting queries for the new AADGraphActivityLogs table to detect Entra ID reconnaissance tooling based on UserAgent, RequestUri, and volume.

Cloudbrothers
How Hackers Hack Phones In Seconds

Want to actually learn hacking?Join The Hacker Academy: https://bit.ly/The-Hacker-AcademyGet instant access to:OSINT Field Manual (find anyone online)Web Pen...

YouTube

SERIOUSLY? AGAIN?

I feel like all these bugs (see also Apache Server, Firefox, etc.) are being discovered with Mythos, and they're just slowly trying to patch as many as they can before releasing the 'New Model'.

https://www.youtube.com/watch?v=8s9jaIPR7PU

#cybersecurity #vulnerability #penetrationtesting

SERIOUSLY? AGAIN?

YouTube

World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.

Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: https://www.itsecurityguru.org/2026/05/07/world-password-day-2026-the-credential-crisis-hasnt-gone-away-its-just-got-more-dangerous/

#offensivesecurity #penetrationtesting

World Password Day 2026: The Credential Crisis Hasn’t Gone Away, It’s Just Got More Dangerous

Every year, World Password Day arrives with a familiar chorus: use longer passwords, don’t reuse them, enable multi-factor authentication, and every year, att

IT Security Guru