What is SNMP Security and Exploitation: A Comprehensive Guide

In this article, I cover how SNMP exploitation works, common vulnerabilities, and how to properly secure it.
https://denizhalil.com/2026/01/21/snmp-security-exploitation-guide

#CyberSecurity #SNMP #NetworkSecurity #InfoSec #InfrastructureSecurity #BlueTeam #RedTeam #Pentesting #ITSecurity #SecurityEngineering #DenizHalil

What is Web Cache Poisoning Attack and Defense: A Comprehensive Guide

In this article, I explain how the attack works, common vectors, and practical prevention technique
https://denizhalil.com/2026/01/26/web-cache-poisoning-attacks-prevention-guide/

#CyberSecurity #WebSecurity #CachePoisoning #AppSec #OWASP #InfoSec #Pentesting #RedTeam #BlueTeam #HTTP

πŸ”₯ Just Announced: Another Must-See Session at BSides Luxembourg!

πŸ€–πŸ’₯ π—§π—›π—˜ π—”π—šπ—˜π—‘π—§π—¦ 𝗒𝗙 𝗖𝗛𝗔𝗒𝗦: π—”π—œ 𝗗π—₯π—œπ—©π—˜π—‘ π— π—”π—Ÿπ—ͺ𝗔π—₯π—˜ π—šπ—˜π—‘π—˜π—₯π—”π—§π—œπ—’π—‘ – Arad Donenfeld βš™οΈπŸ”₯

What happens when AI doesn’t just assist malware developmentβ€”but fully owns it?

This talk explores a system where AI agents autonomously generate malware from start to finish. From prompt engineering and model orchestration to automated build-and-fix loops, it reveals how AI can produce diverse, evasive malware samples that challenge traditional detection. As models evolve, so does the scale, speed, and unpredictability of offensive tooling.

Arad Donenfeld is an attacks and exploits developer at SafeBreach with a strong background in security research, malware development, and offensive tooling. His work focuses on building and testing real-world attack techniques to improve detection and defense strategies.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/

πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg2026 #AISecurity #Malware #RedTeam #CyberSecurity #AI #ThreatResearch

awesome-bof search

SSH Tunneling and Port Forwarding Techniques: A Comprehensive Guide

In this article, I cover:
* How SSH tunneling works under the hood
* Local, remote, and dynamic port forwarding techniques
* Real-world use cases (databases, internal services, pivoting)
* Security risks and hardening recommendations

https://denizhalil.com/2026/02/02/ssh-tunneling-port-forwarding-guide/

#CyberSecurity #sshtunneling #portforwarding #NetworkSecurity #Linux #RedTeam #BlueTeam #Pentesting #InfoSec #securityengineering #EthicalHacking #ITSecurity

Another talk announcement for BSides Luxembourg!

πŸ€–πŸ” π—”π—œ 𝗔𝗑𝗗 𝗖π—₯π—¬π—£π—§π—’π—šπ—₯𝗔𝗣𝗛𝗬 𝗙𝗒π—₯ π—˜π—©π—”π—¦π—œπ—©π—˜ π— π—”π—Ÿπ—ͺ𝗔π—₯π—˜ – zhassulan zhussupov aka @cocomelonckz 🧬πŸ”₯

Modern malware doesn’t just hideβ€”it adapts.

This talk explores how AI and advanced cryptography are reshaping offensive tradecraft, enabling malware to rewrite itself, adapt to environments, and evade behavioral detection. From polymorphic code to stealthy encryption techniques, this is the next evolution of β€œthinking” malware.

zhassulan zhussupov aka @cocomelonckz is a cybersecurity researcher, author, and speaker known for deep expertise in malware development, reverse engineering, and offensive security, with multiple published works and global conference talks.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/

πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg2026 #AISecurity #Malware #Cryptography #RedTeam #CyberSecurity

Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading a C# port of ProxyBlob Agent.

https://github.com/dazzyddos/ClickOnceBlobber

#infosec #cybersecurity #redteam #pentest

Subdomain Takeover Vulnerabilities and Prevention

In this article, I cover:
* How subdomain takeover vulnerabilities occur
* Real-world exploitation scenarios
Reconnaissance and detection techniques
* Practical prevention and DNS hygiene strategies

https://denizhalil.com/2026/02/16/subdomain-takeover-vulnerabilities-prevention/

#CyberSecurity #SubdomainTakeover #DNS #AttackSurface #BugBounty #RedTeam #BlueTeam #InfoSec #CloudSecurity #WebSecurity #EthicalHacking

A .NET 8 toolkit for creating and analysing Windows Shell Link (.lnk) files. Includes a command-line builder (LnkMeMaybe) and a graphical editor (LnkUi).

https://github.com/trustedsec/LnkMeMaybe

#infosec #cybersecurity #redteam #pentest #phishing

🚨 Introducing the AI Security Village at BSides Luxembourg 2026! 🚨

πŸ§ πŸ€– π—”π—œ π—¦π—˜π—–π—¨π—₯π—œπ—§π—¬ π—©π—œπ—Ÿπ—Ÿπ—”π—šπ—˜ – π—§π—˜π—–π—›π—‘π—œπ—–π—”π—Ÿ 𝗧π—₯π—”π—œπ—‘π—œπ—‘π—š & π—œπ— π—£π—Ÿπ—˜π— π—˜π—‘π—§π—”π—§π—œπ—’π—‘ (2-Day Deep Dive) – 𝗣𝗔π—₯𝗧𝗛 π—¦π—›π—¨π—žπ—Ÿπ—” & π—‘π—”π—šπ—”π—₯𝗝𝗨𝗑 π—₯π—”π—Ÿπ—Ÿπ—”π—£π—”π—Ÿπ—Ÿπ—œ βš™οΈπŸ”₯

π—§π—›π—œπ—¦ π—œπ—¦π—‘β€™π—§ 𝗝𝗨𝗦𝗧 π—”π—‘π—’π—§π—›π—˜π—₯ 𝗧π—₯π—”π—–π—ž. π—§π—›π—œπ—¦ π—œπ—¦ π—ͺπ—›π—˜π—₯π—˜ π—§π—›π—˜π—’π—₯𝗬 π— π—˜π—˜π—§π—¦ 𝗛𝗔𝗑𝗗𝗦-𝗒𝗑 π—”π—œ π—¦π—˜π—–π—¨π—₯π—œπ—§π—¬.

The AI Security Village brings a full 2-day immersive technical experience, diving deep into real-world implementation of AI security. From adversarial machine learning to securing agentic systems and LLM architectures, this village is designed for practitioners who want to go beyond concepts and actually build, break, and secure AI systems.

Expect intensive, hands-on sessions, practical techniques, and real-world scenarios covering how modern AI systems are attackedβ€”and how to defend them effectively.

Parth Shukla is a Senior Security Researcher specializing in AI Security and Adversarial Machine Learning. With a strong offensive security background, his work focuses on securing agentic systems and LLM architectures, bridging the gap between traditional AppSec and emerging AI-driven risks.

Nagarjun Rallapalli is involved in advancing AI security initiatives and contributes to building and testing secure AI systems.

πŸ“… Conference Dates: 6–8 May 2026 | 09:00–18:00
πŸ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
🎟️ Tickets: https://2026.bsides.lu/tickets/
πŸ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg2026 #AISecurityVillage #AISecurity #AdversarialAI #LLMSecurity #CyberSecurity #RedTeam #AI