DEATHCon CFP open until June. Great conference with great content.
DEATHCon CFP open until June. Great conference with great content.
๐ข New Article: Lateral Movement via Microsoft Speech
๐๏ธ Microsoft Speech Platform is built-in in Windows environments to enable Speech recognition, Voice input, Text-to-Speech & Speech features in Windows, Edge & Office
๐ฆ Deepโdive playbook on how Microsoft Speech can be abused for lateral movement and how defenders can perform detection.
๐ 1x Playbook
๐ก Detection Opportunities
๐น 1x MDE Query
๐๐๐ญ๐๐๐ญ๐ข๐จ๐ง - ๐๐ฏ๐๐ง๐ญ ๐๐'๐ฌ
โ
๏ธ 4657 & 4663 - {655D9BF9-3876-43D0-B6E8-C83C1224154C}
โ
๏ธ 4688 - SpeechRuntime.exe
โ
๏ธ 7040 & 7036 - RemoteRegistry Service
โ๏ธ https://ipurple.team/2026/04/07/microsoft-speech/ #purpleteam #blueteam #detectionengineering
BSides Luxembourg talk announcement!
๐ง๐จ ๐ก๐ข๐ง ๐ฆ๐ข ๐๐๐ฅ๐ ๐๐๐ฆ๐ฆ: ๐ง๐๐ ๐๐๐๐๐๐ก ๐ช๐ข๐ฅ๐๐ ๐ข๐ ๐๐๐ก๐จ๐ซ ๐ฃ๐๐๐๐๐ฅ๐ฆ ๐๐ก๐ ๐๐๐ง๐๐๐ง๐๐ข๐ก ๐๐๐๐๐๐๐ก๐๐๐ฆ - ๐ ๐๐ฆ๐ฆ๐๐ ๐ข ๐๐๐ฅ๐ง๐ข๐๐๐๐ ๐ก๏ธ๐
Linux packers and loaders are a sneaky blind spot in cybersecurity. They hide code with encryption and obfuscation, then run it straight from memory to dodge detection. This talk dives into the โhARMlessโ ARM64 packer, showing off tricks like layered encryption and direct syscalls, while exposing a harsh truth: many defenses on Linux barely see it coming.
Massimo Bertocchi https://pretalx.com/bsidesluxembourg-2026/speaker/SU38N8/ Massimo Bertocchi is a Zรผrich-based Threat Hunter and Detection Engineer with dual Masterโs degrees from KTH Royal Institute of Technology and Aalto University, recognized for his award-winning research uncovering covert C2 channels in Microsoft Teams that enable high-speed data exfiltration and expose critical gaps in enterprise security monitoring.
๐
Conference dates: 6โ8 May 2026 | 09:00โ18:00
๐ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐๏ธ Tickets: https://2026.bsides.lu/tickets/
๐
Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg2026 #CyberSecurity #ThreatHunting #MalwareAnalysis #CloudSecurity #DetectionEngineering
Has anyone been able to successfully replicate copying and pasting ClickFix/TerminalFix/*Fix commands into macOS Terminal to trigger this new-fangled malware warning? I have attempted numerous commands, from base64-encoded content to osascripts mimicking macOS infostealer prompts to cURL commands downloading remote content. I even replicated the command documented in the Toms Guide article using the same tool in the same browser and it ran flawlessly in Terminal with no popup. And yes, Iโm running Tahoe 26.4 on an M3. Iโd like to think this would be a useful โstop-and-thinkโ mitigation but I canโt even consistently trigger it. And, per usual, Apple is tight-lipped on HOW they are detecting malicious commands so itโs likely to remain a black box mitigation. And yeah, I get it, the end user can just click right through the warning via a sneaky social engineering prompt. My goal was to try and build out detection logic to ID when a user gets hit with a prompt so I can at least investigate what the user tried to do and dig deeper into the threat. Since theoretically the user wonโt run the command, it wonโt get logged in SIEM/EDR tools. I need to rely on other mechanisms for detecting the paste event.
#macos #clickfix #terminalfix #threatintel #pastejacking #detectionengineering #threathunting
๐ข New Article Drop: Weaponizing Windows Toast Notifications for Social Engineering
๐ง Windows Toast Notifications are everywhere: policy updates, VPN reminders, password expiry alerts. Because these are legitimate applications that users trust, they can become a highโimpact socialโengineering surface.
๐ฆ I just published a deepโdive playbook on how Toast Notifications can be abused for credential harvesting, lateral movement, user manipulation etc. and how defenders can perform detection.
๐ 1x Playbook
๐ก Detection Opportunities
๐ฏ 1x MDE Query
๐จ 1x SIGMA Rule
๐๐๐ญ๐๐๐ญ๐ข๐จ๐ง - ๐๐ฏ๐๐ง๐ญ ๐๐'๐ฌ
โ
7 & 13 (Sysmon)
โ
DLL Monitoring: wpnapps.dll & msxml6.dll from unexpected processes
โ๏ธ https://ipurple.team/2026/03/25/toast-notifications/
#purpleteam #detectionengineering #blueteam #threathunting
@vickyjo @verovaleros Hi @verovaleros, are you a #detectionengineering specialist operating at the cutting edge of whats possible here today?
Or doing something with Agentic SOC?
If yes, then we're trying to build panels on these topics at BSidesLuxembourg.
#BSidesLuxembourg2026
#DetectionengineeringVillage
#AgenticSOCvillage
Microsoft warned about OAuth redirect abuse on March 2, 2026. This isn't credential theft or classic token theft by itself. It weaponizes Entra ID error handling.
An attacker registers an OAuth app with a malicious redirect URI, sends a crafted login.microsoftonline.com link designed to fail, and Entra ID's 302 redirect lands the victim on a phishing page or malware dropper. The sign-in fails and the attacker still wins.
I built a detection and hardening kit you can deploy to an existing Sentinel workspace:
โข 4 analytics rules: consent after risky sign-in, suspicious redirect URIs, OAuth error clustering, bulk consent
โข 5 hunting queries: permissions baseline, non-corporate IP auth, high-privilege apps, URI inventory, token replay
โข 1 workbook: OAuth Security Dashboard
Entra hardening: verified-publisher consent restriction, MFA policy for risky OAuth sign-ins
โข OAuth app audit: flags suspicious redirect URIs and overprivileged permissions across app registrations
Blog post: https://nineliveszerotrust.com/blog/oauth-redirect-abuse-sentinel/
Companion lab on GitHub: https://github.com/j-dahl7/oauth-redirect-abuse-sentinel
#MicrosoftSentinel #EntraID #DetectionEngineering #OAuth #IdentitySecurity #BlueTeam

Microsoft warned about OAuth redirect abuse enabling phishing and malware delivery. Build Sentinel analytics rules, hunting queries, a security workbook, and Entra ID hardening policies to detect and prevent this technique in your tenant.
CVE-2026-21902 represents a high-impact infrastructure exposure.
Affected platform: Junos OS Evolved on PTX series routers.
Attack vector: Unauthenticated network access.
Privilege level: Root execution.
Service: On-Box Anomaly Detection, enabled by default.
Strategic risk:
โข Traffic interception capability
โข Policy manipulation
โข Controller redirection
โข Lateral pivoting
โข Long-term foothold persistence
Although no exploitation has been observed, historically, high-performance routing infrastructure is a prime target due to its control-plane visibility and network centrality.
Recommended actions:
โ Immediate patch validation
โ Control-plane traffic monitoring
โ Service exposure review
โ Network segmentation validation
โ Threat hunting for anomalous routing behavior
Are infrastructure devices integrated into your continuous detection engineering pipeline?
Source: https://www.securityweek.com/juniper-networks-ptx-routers-affected-by-critical-vulnerability/
Engage below.
Follow TechNadu for high-signal vulnerability intelligence.
Repost to strengthen security awareness.
#Infosec #CVE2026 #Juniper #RouterSecurity #CriticalInfrastructure #ThreatModeling #DetectionEngineering #NetworkDefense #ZeroTrustArchitecture #CyberRisk #SecurityOperations #VulnerabilityManagement
APT37โs Ruby Jumper campaign demonstrates a mature approach to air-gap traversal.
Observed tradecraft includes:
โข LNK-based initial execution
โข Embedded PowerShell payload extraction
โข Ruby interpreter abuse (v3.3.0)
โข Scheduled task persistence (5-minute interval)
โข USB-based covert bidirectional C2
โข Multi-stage backdoor deployment
Toolset: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, BLUELIGHT.
The removable media relay model enables:
โ Command staging offline
โ Data exfiltration without internet access
โ Lateral spread across isolated systems
โ Surveillance via Windows spyware
This reinforces a critical point:
Air-gap controls must extend beyond physical disconnection โ including USB governance, device auditing, behavioral monitoring, and strict runtime execution policies.
Are critical infrastructure operators prepared for USB-mediated C2 relays?
Engage below.
Follow TechNadu for high-signal threat intelligence insights.
Repost to elevate awareness.
#Infosec #APT37 #AirGapSecurity #ThreatModeling #MalwareAnalysis #NationStateThreats #USBExfiltration #SOC #DetectionEngineering #CyberDefense #OperationalSecurity #ThreatHunting #ZeroTrustArchitecture
Identity compromise continues to dominate intrusion chains.
From the Sophos Active Adversary Report 2026:
โข 67% of initial access attributed to identity abuse
โข 3.4-hour median to Active Directory pivot
โข 3-day median dwell time
โข 88% ransomware deployment off-hours
โข 79% data exfiltration off-hours
Directory services remain high-value assets โ authentication, authorization, policy control, privilege mapping.
The compressed timeline from credential misuse to directory-level access underscores the need for:
โ Continuous identity monitoring
โ Behavioral analytics
โ After-hours SOC coverage
โ Conditional access enforcement
โ Least-privilege architecture
Generative AI is functioning as a force multiplier โ improving phishing quality and campaign scale - not yet delivering autonomous attack chains.
Is identity governance keeping pace with adversary dwell time compression?
Engage below.
Follow TechNadu for high-signal infosec analysis.
Repost to strengthen industry awareness.
#Infosec #IdentityThreats #RansomwareDefense #ActiveDirectorySecurity #ThreatModeling #GenAI #SecurityOperations #CyberRisk #ZeroTrustArchitecture #DetectionEngineering #EnterpriseSecurity #ThreatHunting