๐จ CrossโSession Activation is a detection gap hiding in plain sight.
๐ก The technique abstract below highlights the minimum viable signals for defenders.
๐ญ Interesting to know if this technique is part of your threat emulation library.
๐จ CrossโSession Activation is a detection gap hiding in plain sight.
๐ก The technique abstract below highlights the minimum viable signals for defenders.
๐ญ Interesting to know if this technique is part of your threat emulation library.
๐ ๐๐ฒ๐๐๐ซ ๐ฌ๐ข๐ ๐ง๐๐ฅ ๐ข๐ฌ ๐๐ซ๐จ๐ฉ๐ฉ๐ข๐ง๐ .
๐ ๐๐ ๐ง๐จ๐ข๐ฌ๐ ๐ข๐ฌ ๐ซ๐ข๐ฌ๐ข๐ง๐ .
To help, I created a list of active cybersecurity blogs written by people who still publish real research.
If you follow any of these already (or have gems I should add), let me know.
๐https://github.com/netbiosX/CyberSec-Blogs #redteam #purpleteam #threathunting

Lists of independent cybersecurity blogs covering threat intelligence, purple team, red team, threat hunting, and detection engineering. Most are personal blogs maintained by practitioners who publ...
Accidentally leveraged a supply chain attack this week when it turned out that the GitHub org I'd cloned for a cyber exercise was "unofficial" and none of the exercise participants knew who actually owned it although they did recognise the committers. Chaos ensued.
I have made some recent updates to my Ultimate Cybersecurity Guide GitHub Repo! New documentation, new how-to guides and new subsections to the AI portion of the repo, as well as a few other things here and there. Give it a look if you are at all interested!
#GitHub #Cybersecurity #Guide #HowTo #PurpleTeam https://github.com/Pnwcomputers/ULTIMATE-CYBERSECURITY-MASTER-GUIDE

This repository provides a centralized resource for operational cyber defense and offense, compiling Theory, Tools, Operating Procedures, and Step-by-Step Guides across various critical security do...
Another talk announcement for BSides Luxembourg!
๐ฅ๐ค ๐ข๐ ๐ฆ๐๐๐ง ๐ ๐๐๐๐๐๐๐ก๐ง๐๐๐๐ฌ ๐๐ฅ๐๐๐๐๐๐ ๐๐ก ๐ข๐ฅ๐๐๐ก๐๐ญ๐๐ง๐๐ข๐ก (๐ข๐ฅ ๐ ๐๐ก๐ฌ) ๐จ๐ฆ๐๐ก๐ ๐๐ โ Panagiotis Fiskilis ๐ฅ
What starts as a harmless search can spiral into a multi-organization data breachโespecially when AI gets involved.
This talk dives into real-world research showing how AI can be weaponized for OSINT, enabling large-scale data discovery, spear phishing campaigns, and even manipulation of AI systems themselves. From injecting malicious context into models to scaling attacks via APIs and agent workflows, this session explores how adversaries can turn AI into a powerful offensive toolโand how defenders can detect and respond.
Expect a true purple team perspective, blending attacker techniques with defensive insights, including OPSEC considerations and strategies to identify malicious AI-driven activities before they escalate.
Panagiotis Fiskilis is a Senior Red Team Operator at NVISO, specializing in API hacking, Active Directory exploitation, and malware development. With multiple industry certifications (OSCP, OSWE, CRTO, eWPT and more), he brings hands-on offensive expertise combined with a strong research-driven mindset.
๐
Conference Dates: 6โ8 May 2026 | 09:00โ18:00
๐ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐๏ธ Tickets: https://2026.bsides.lu/tickets/
๐
Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
๐ Browse sessions, track talks in real time, and plan your schedule on Hacker Tracker: https://hackertracker.app/schedule?conf=BSIDESLUX2026
#BSidesLuxembourg2026 #AISecurity #RedTeam #OSINT #CyberSecurity #AI #ThreatIntelligence #PurpleTeam
๐ข New Article: Lateral Movement via Microsoft Speech
๐๏ธ Microsoft Speech Platform is built-in in Windows environments to enable Speech recognition, Voice input, Text-to-Speech & Speech features in Windows, Edge & Office
๐ฆ Deepโdive playbook on how Microsoft Speech can be abused for lateral movement and how defenders can perform detection.
๐ 1x Playbook
๐ก Detection Opportunities
๐น 1x MDE Query
๐๐๐ญ๐๐๐ญ๐ข๐จ๐ง - ๐๐ฏ๐๐ง๐ญ ๐๐'๐ฌ
โ
๏ธ 4657 & 4663 - {655D9BF9-3876-43D0-B6E8-C83C1224154C}
โ
๏ธ 4688 - SpeechRuntime.exe
โ
๏ธ 7040 & 7036 - RemoteRegistry Service
โ๏ธ https://ipurple.team/2026/04/07/microsoft-speech/ #purpleteam #blueteam #detectionengineering
Another talk announcement!
๐ฃ๐ค ๐๐ข๐ข๐๐๐ฌ๐ ๐ฃ๐จ๐ฅ๐ฃ๐๐ ๐ง๐๐๐ , ๐๐๐๐๐ข ๐ฃ๐จ๐ฅ๐ฃ๐๐ ๐๐ข๐ง๐ฆ - ๐ฃ๐๐ง๐ฅ๐๐๐ ๐ ๐๐๐๐๐ & ๐ฅ๐๐๐ฃ๐ ๐๐ ๐๐๐ข๐จ๐ฅ๐ฌ ๐ก๏ธโ๏ธ
What if purple teaming could run itself? ๐ This talk reveals an AI driven framework that simulates real world attacks, uncovers detection gaps, and continuously strengthens your defenses with zero manual effort. It's more than automation. It is a smart, self evolving security cycle where offense and defense work together in real time to stay ahead of threats.
Patrick Mkhael https://pretalx.com/bsidesluxembourg-2026/speaker/WHMGFD/ is an Offensive Security R&D lead with a strong blue team foundation, now focused on red teaming, cloud pentesting, and building tools for adversary emulation and automated security testing.
Ralph El Khoury https://pretalx.com/bsidesluxembourg-2026/speaker/X9QCJN/ is a red teamer and CVE hunter with a passion for breaking AD and web apps. Teaches kids to question everything, starting with default credentials.
๐
Conference dates: 6โ8 May 2026 | 09:00โ18:00
๐ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐๏ธ Tickets: https://2026.bsides.lu/tickets/
๐
Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg2026 #CyberSecurity #PurpleTeam #RedTeam #BlueTeam #AI