🔴 Windows Is Lying To Your Face Right Now

You clicked a link. The site looked real. Your credentials are already gone.

https://www.youtube.com/shorts/BP1RqnlnE8s

#cybersecurity #windowssecurity #networksecurity #cyberthreat #infosec #hacking #cve #vulnerability #threatintel #security

Windows Is Lying To Your Face Right Now #Shorts

YouTube

I put together a PoC for a boot manager downgrade attack against BitLocker, building on Microsoft STORM's BitUnlocker research (CVE-2025-48804). Simpler to pull off than Bitpixie in most cases.

The push for TPM+PIN enforcement and SVN-based revocation shall continue!

Repo: https://github.com/garatc/BitUnlocker

All credit to Microsoft STORM for the original research

#BitLocker #infosec #pentesting #WindowsSecurity #physicalaccess

GitHub - garatc/BitUnlocker: Downgrade attack for CVE-2025-48804

Downgrade attack for CVE-2025-48804. Contribute to garatc/BitUnlocker development by creating an account on GitHub.

GitHub
🔐 Just shipped a fix for the April 2026 Windows update (KB5083769) that flags unsigned RDP files as "Unknown Publisher".
If you manage RDP shortcuts via Intune and your users are suddenly seeing red security warnings — here's a complete solution:
✅ Self-signed code signing cert (no PKI required)
✅ rdpsign.exe signing workflow
✅ Intune Win32 package (install + uninstall scripts)
✅ Trusted Certificate profile + Settings Catalog policies
✅ Versioned detection rule for clean updates
✅ Supersedence pattern for migrating from unsigned deployments
Tested in production on a real M365 Business Premium environment.
🔗 github.com/Bluewal/m365-intune-scripts/tree/main/intune/rdp-signing
#Intune #Microsoft365 #RDP #BlueTeam #WindowsSecurity #MicrosoftDefender

What are Pass-the-Hash and Pass-the-Ticket Attacks: A Comprehensive Guide

In this article, I cover how these attacks work, their differences, and how to detect and mitigate them.
https://denizhalil.com/2026/01/05/pass-the-hash-pass-the-ticket-attacks-guide/

#cybersecurity #ActiveDirectory #PassTheHash #PassTheTicket #credentialaccess #RedTeam #BlueTeam #Pentesting #InfoSec #WindowsSecurity #EthicalHacking #ITSecurity #denizhalil

What is NetBIOS and SMB Exploitation Techniques: A Practical Guide

In this article, I cover key exploitation techniques, real-world attack scenarios, and how to secure these services effectively.

https://denizhalil.com/2026/01/15/netbios-smb-exploitation-techniques-guide/

#CyberSecurity #SMB #NetBIOS #NetworkSecurity #ActiveDirectory #RedTeam #BlueTeam #Pentesting #InfoSec #WindowsSecurity #EthicalHacking #ITSecurity #DenizHalil