ForceMemo Campaign: Stealthy Takeover Compromises Hundreds of Python Repositories in Ongoing Supply Chain Assault
Short summary: https://hackerworkspace.com/article/neuracyb-cybersecurity-intelligence-investigation-1
ForceMemo Campaign: Stealthy Takeover Compromises Hundreds of Python Repositories in Ongoing Supply Chain Assault
Short summary: https://hackerworkspace.com/article/neuracyb-cybersecurity-intelligence-investigation-1
๐ฎ The Return of Malware & Monsters: Collaborative IR Gaming (2h Workshop) on May 6th!
๐๐ข๐ง๐ง๐ ๐๐ข๐ก๐ง๐๐๐ก '๐๐ ๐๐๐: ๐๐ข๐๐๐๐๐ข๐ฅ๐๐ง๐๐ฉ๐ ๐๐ก๐๐๐๐๐ก๐ง ๐ฅ๐๐ฆ๐ฃ๐ข๐ก๐ฆ๐ ๐ง๐ฅ๐๐๐ก๐๐ก๐ ๐ง๐๐ฅ๐ข๐จ๐๐ ๐๐๐ ๐๐ก๐ with Klaus Agnoletti (@klausagnoletti) & ๐๐๐๐ก ๐ฆ๐ข๐ฅ๐๐ก๐ฆ๐๐ก - 6 May, 9AM - 11AM
Back by popular demand after last year's hit! Ditch dull tabletops for Malware & Monsters โ tabletop RPG meets creature-collecting where teams hunt/contain digital threats in story-driven scenarios with MITRE ATT&CK-mapped malware "malmons." Experience real IR chaos: coordination under pressure, incomplete intel, stakeholder drama. Take roles like Hunter, Analyst, Forensicator, Communicator to see how teams actually collaborate. Learn mechanics, build custom scenarios from real malware history, run live sims with "type effectiveness" for defenses and evolution for escalating attacks. Walk away with free, ready-to-use materials for fun, effective IR training.
Led by Klaus Agnoletti https://pretalx.com/orga/event/bsidesluxembourg-2026/speakers/SQVVHK/ (infosec pro since 2004, BSides Kรธbenhavn co-founder, storytelling cyber advisor, neurodiversity advocate) & Glen Sorensen https://pretalx.com/orga/event/bsidesluxembourg-2026/speakers/J3PRCC/ (Recovering CISO, DeleteMe Solutions Engineer, OSINT/AI expert, HackBack Gaming Incident Master).
๐
Conference dates and time: 6โ8 May 2026 | 9AM - 6PM
๐ Venue: 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐๏ธ Tickets: https://2026.bsides.lu/tickets/
๐
Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/
Game your way to better IR skills โ popular return engagement! ๐ฒ
#BSidesLuxembourg2026 #IncidentResponse #CyberSecurityTraining #BlueTeam #GameBasedLearning #MITREATTACK #BSides #DnD #DFIR
๐ต THREAT INTELLIGENCE
CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
Vulnerability | CRITICAL
CVEs: CVE-2025-47813
CISA warned U.S. government agencies to secure their Wing FTP Server instances against an actively exploited vulnerability that may be chained in...
Full analysis:
https://www.yazoul.net/news/news/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths
Boggy Serpens Threat Assessment
https://unit42.paloaltonetworks.com/boggy-serpens-threat-assessment/
Short summary: https://hackerworkspace.com/article/boggy-serpens-threat-assessment
Two playlists every day on hacking & defense. Discover the latest tools and techniques now. ๐ฅ https://www.youtube.com/playlist?list=PLXqx05yil_md7S1-8rQLzaZZ3BiXVYaXK
#CyberSecurity #IncidentResponse #CloudSecurity #Hacking #Phishing

Difference Between APTs and Malware: Understanding Advanced Cyber Threats | Huntress
https://www.huntress.com/malware-guide/difference-between-apts-and-malware
Short summary: https://hackerworkspace.com/article/difference-between-apts-and-malware-understanding-advanced-cyber-threats-huntress



Fancy Tools From Fancy Bear, Another Proxy Network Takedown, and A Look Ahead
Short summary: https://hackerworkspace.com/article/fancy-tools-from-fancy-bear-another-proxy-network-takedown-and-a-look-ahead
This weekโs news includes a reappearance by an old favorite, APT28, aka Fancy Bear, which is back with some nasty new implants and tools it is deploying against targets in Ukraine (2:10), and we also have another law enforcement disruption of a residential proxy network, this one known as SocksEscort,โฆ