43 Followers
168 Following
55 Posts
Detection Engineering & Incident Response

NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368

#citrix #vulnerabilitymanagement #vulnerability

https://vulnerability.circl.lu/bundle/1ae9c3df-c65f-4755-b3a9-4d76f8c0e772

Vulnerability-Lookup

Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.

RE: https://infosec.exchange/@NorthSec/116267731097534469

I'll be giving a detection as code talk at NonthSec 2026. See you there!

Blue teamers, if you use Bloodhound to map trust relationships that may also be useful to attackers and would like to extend that to your (possibly otherwise unmanaged) fleet of #linux systems, golinhound (https://github.com/RantaSec/golinhound) by my colleague Lukas Klein may be useful to you.
So far it can be used to produce useful data about #ssh keys, #sudo, #Active_Directory, and #Azure / #EntraID integration.
#itsecurity
GitHub - RantaSec/golinhound: A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing SharpHound and AzureHound data.

A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing SharpHound and AzureHound data. - RantaSec/golinhound

GitHub

Call for papers is now open for hack.lu 2026 (the 20th edition!)

The purpose of the hack.lu convention is to provide an open and free playground where people can discuss the implications of new technologies in society. hack.lu is a balanced mix convention where technical and non-technical people can meet and share all kinds of information freely. The convention will be held in the Grand-Duchy of Luxembourg in October (20-23.10.2026). The most significant new discoveries about computer network attacks and defenses, open-source security solutions, and pragmatic real-world security experiences will be presented in a four-day series of informative tutorials.

We are waiting for your great proposals!

https://2026.hack.lu/blog/hack.lu-2026-call-for-papers/

#cfp #luxembourg #conference #cybersecurity #callforpapers #hacklu

Call for papers is now open for hack.lu 2026 (the 20th edition!)

Time to submit a talk, training or workshop to hack.lu

hack.lu 2026
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
#UNC2814 #GRIDTIDE
https://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-campaign
Disrupting the GRIDTIDE Global Cyber Espionage Campaign | Google Cloud Blog

GTIG, Mandiant, and partners took action to disrupt a global espionage campaign from a suspected PRC-nexus cyber espionage group.

Google Cloud Blog

We’re looking for a Detection Engineer to build and maintain detection rules using the detection-as-code principle (with Sigma!). If you’re into turning threat intelligence data into actionable alerts, we want to hear from you! 🚀

#detectionengineering

https://www.cert.europa.eu/vacancies/it-security-officer-detection-engineer

CERT-EU - Vacancy - IT Security Officer - Detection Engineer

IT Security Officer - Detection Engineer

Can LNK files ever be trusted?

⚡ My latest blog post demonstrates several new LNK abuse methods, allowing you to fully spoof the target an LNK file shows in Explorer. It also introduces a tool to create your own LNKs, and a tool to detected spoofed ones yourself.

🐬 https://www.wietzebeukema.nl/blog/trust-me-im-a-shortcut

Why the French govt digital services chose #Python and #Django: “the boring stack can be upgraded easily and will still work in 20 years” -- Manuel Raynaud showcases LaSuite #FOSDEM. Open source digital collaboration apps, built as an alternative to Microsoft Teams / Office

"Registry Writes Without Registry Callbacks" by Rad Kawar @ Deceptiq

https://deceptiq.com/blog/ntuser-man-registry-persistence

Registry Writes Without Registry Callbacks

Explore NTUSER.MAN, an overlooked Windows profile mechanism that allows registry persistence without triggering CmRegisterCallback EDR monitoring.

DeceptIQ

Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fusion Middleware (component: Weblogic Server Proxy Plug-in for Apache HTTP Server, Weblogic Server Proxy Plug-in for IIS).

🔗 https://vulnerability.circl.lu/vuln/CVE-2026-21962

#vulnerability #vulnerabilitymanagement #cybersecurity

Vulnerability-Lookup

Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.