NeuraCyb - Cybersecurity Intelligence & Investigation

Threat intel, investigations, and analysis.

NeuraCyb Intelligence

๐ŸŽฎ The Return of Malware & Monsters: Collaborative IR Gaming (2h Workshop) on May 6th!

๐—š๐—ข๐—ง๐—ง๐—” ๐—–๐—ข๐—ก๐—ง๐—”๐—œ๐—ก '๐—˜๐—  ๐—”๐—Ÿ๐—Ÿ: ๐—–๐—ข๐—Ÿ๐—Ÿ๐—”๐—•๐—ข๐—ฅ๐—”๐—ง๐—œ๐—ฉ๐—˜ ๐—œ๐—ก๐—–๐—œ๐——๐—˜๐—ก๐—ง ๐—ฅ๐—˜๐—ฆ๐—ฃ๐—ข๐—ก๐—ฆ๐—˜ ๐—ง๐—ฅ๐—”๐—œ๐—ก๐—œ๐—ก๐—š ๐—ง๐—›๐—ฅ๐—ข๐—จ๐—š๐—› ๐—š๐—”๐— ๐—œ๐—ก๐—š with Klaus Agnoletti (@klausagnoletti) & ๐—š๐—Ÿ๐—˜๐—ก ๐—ฆ๐—ข๐—ฅ๐—˜๐—ก๐—ฆ๐—˜๐—ก - 6 May, 9AM - 11AM

Back by popular demand after last year's hit! Ditch dull tabletops for Malware & Monsters โ€“ tabletop RPG meets creature-collecting where teams hunt/contain digital threats in story-driven scenarios with MITRE ATT&CK-mapped malware "malmons." Experience real IR chaos: coordination under pressure, incomplete intel, stakeholder drama. Take roles like Hunter, Analyst, Forensicator, Communicator to see how teams actually collaborate. Learn mechanics, build custom scenarios from real malware history, run live sims with "type effectiveness" for defenses and evolution for escalating attacks. Walk away with free, ready-to-use materials for fun, effective IR training.

Led by Klaus Agnoletti https://pretalx.com/orga/event/bsidesluxembourg-2026/speakers/SQVVHK/ (infosec pro since 2004, BSides Kรธbenhavn co-founder, storytelling cyber advisor, neurodiversity advocate) & Glen Sorensen https://pretalx.com/orga/event/bsidesluxembourg-2026/speakers/J3PRCC/ (Recovering CISO, DeleteMe Solutions Engineer, OSINT/AI expert, HackBack Gaming Incident Master).

๐Ÿ“… Conference dates and time: 6โ€“8 May 2026 | 9AM - 6PM
๐Ÿ“ Venue: 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule: https://pretalx.com/bsidesluxembourg-2026/schedule/

Game your way to better IR skills โ€“ popular return engagement! ๐ŸŽฒ

#BSidesLuxembourg2026 #IncidentResponse #CyberSecurityTraining #BlueTeam #GameBasedLearning #MITREATTACK #BSides #DnD #DFIR

๐Ÿ”ต THREAT INTELLIGENCE

CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

Vulnerability | CRITICAL
CVEs: CVE-2025-47813

CISA warned U.S. government agencies to secure their Wing FTP Server instances against an actively exploited vulnerability that may be chained in...

Full analysis:
https://www.yazoul.net/news/news/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths

#ThreatIntel #SecurityNews #IncidentResponse

Wing FTP Server Flaw Actively Exploited - CISA Urges Immediate Patching

CISA warned U.S. government agencies to secure their Wing FTP Server instances against an actively exploited vulnerability that may be chained in remote code execution attacks. [...]

Yazoul Security
Boggy Serpens Threat Assessment

Iranian threat group Boggy Serpens' cyberespionage evolves with AI-enhanced malware and refined social engineering. Unit 42 details their persistent targeting.

Unit 42

Two playlists every day on hacking & defense. Discover the latest tools and techniques now. ๐ŸŽฅ https://www.youtube.com/playlist?list=PLXqx05yil_md7S1-8rQLzaZZ3BiXVYaXK

#CyberSecurity #IncidentResponse #CloudSecurity #Hacking #Phishing

260316 rootshell.online

YouTube
Difference Between APTs and Malware: Understanding Advanced Cyber Threats | Huntress

Learn the difference between APTs and malware: how long-term threat actors orchestrate attacks vs malwareโ€™s tactical role.

Huntress
New playlist online: from malware analysis to ethical hacking demos. Check it out here ๐Ÿ‘‰ https://www.youtube.com/playlist?list=PLXqx05yil_mf-JXqzISeCRDx_WQ5ToDFW
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
260314 rootshell.online

YouTube
New playlist online: from malware analysis to ethical hacking demos. Check it out here ๐Ÿ‘‰ https://www.youtube.com/playlist?list=PLXqx05yil_meVZxfweEcJLwzoVmXIwux4
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
260314 rootshell.online

YouTube
New playlist online: from malware analysis to ethical hacking demos. Check it out here ๐Ÿ‘‰ https://www.youtube.com/playlist?list=PLXqx05yil_meJALqwdzmmUsNWGT9nYngW
#Malware #EthicalHacking #CyberDefense #NetworkSecurity #IncidentResponse
260314 rootshell.online

YouTube
Fancy Tools From Fancy Bear, Another Proxy Network Takedown, and A Look Ahead

This weekโ€™s news includes a reappearance by an old favorite, APT28, aka Fancy Bear, which is back with some nasty new implants and tools it is deploying against targets in Ukraine (2:10), and we also have another law enforcement disruption of a residential proxy network, this one known as SocksEscort,โ€ฆ

Decipher