250 Followers
156 Following
394 Posts

🧩 Mischief and Malware Enthusiast πŸ”πŸ•΅οΈβ€β™‚οΈ | Breaking firewalls since '13 πŸ”₯

"Professionally smitten by the devilish charm of malicious ingenuity." #CyberRomantic

~ Nullum Cacas Statum ~ αŽͺᏞᏞ hαŽͺαŽ₯Ꮮ ᏆhᎬ αžαŽΎα’αŽ  Ꮎf ᏞᎾᎢs ~

#Malware | #Phishing | #Hacking | #Vulnerabilities | #Cybersecurity | #NetworkSecurity

#ADD | #Runner | #DnD

Blue Team: πŸ’™πŸ’™
Purple Team: πŸ’œ
Red Team: ❀️

Nullum Cacas Statum
αŽͺᏞᏞ hαŽͺαŽ₯Ꮮ ᏆhᎬ αžαŽΎα’αŽ  Ꮎf ᏞᎾᎢs
CountryCyberia
@conansysadmin This is such a cool quote haha

..and there's another Unfurl release as well! v2025.03 is live and adds new features and some fixes, including:

πŸ”Ž Parsing #Google Search's UDM parameter
🐘 Recognizing #Mastodon usernames and parsing Mastodon forks (like truthsocial[.]com and gab[.]com)
🧹 Utility parser to "clean up" inputs

Try it out at https://unfurl.link or read more about the update https://dfir.blog/unfurl-parses-googe-udm-and-truth-social/

#DFIR #OSINT

unfurl

Extract and Visualized Data from URLs

dfir.blog
@ligniform Good Job, keep learning πŸ˜‰

Facebook has disclosed a vulnerability in the FreeType font rendering library, affecting all versions up to 2.13.0. This can lead to arbitrary code execution and is seen exploited in the wild.

FreeType 2 is a widely used open-source library that enables text rendering and manipulation. It is integrated into millions of (embedded) systems and applications, including Linux, Android, game engines, Browsers. GUI frameworks, and online platforms.

Although a non vulnerable version (FreeType 2.13.0 and up) was released on 2023-02-09, it is expected that many vulnerable versions are still in use due to its widespread use of this library.

https://www.bleepingcomputer.com/news/security/facebook-discloses-freetype-2-flaw-exploited-in-attacks/

CVE-2025-27363

New post from #Qilin : Ministry Of Foreign Affairs Of Ukraine
More at : https://www.ransomlook.io/group/Qilin #Ransomware
qilin details

Open, searchable ransomware group intelligence with live stats, posts and an API.

@chillybot @da_667 @screaminggoat

I see mentions from ppl stating "I don't have this license so I'm not impacted"

But are we sure that’s enough? The requirement in the SA says β€œDNS security logging must be enabled…” but doesn’t actually mention anything about needing a license.

I get that the license is required to use the feature and see the logs, but does just enabling the setting make you vulnerable? I’ve been trying to look into this, because the advisory isn’t super clear on this (for a change....  .

Anyone have any ideas or maybe has looked into an actual attack or found a proof of concept?

@Wrewdison #meshtastic is indeed very cool πŸ™‚

#Netflix Europe offices raided in tax fraud probe

  • Netflix's offices in France and the Netherlands were raided due to a tax fraud laundering investigation, according to a French judicial source.
  • The French PNF opened the investigation in November 2022, focusing on international companies.Authorities suspect Netflix of "covering up serious tax fraud and off-the-books work," as stated by the PNF.

https://www.bbc.com/news/articles/cwy1vze09wwo

Netflix Netherlands and France offices raided in tax fraud probe - BBC News

The raid is part of an investigation in France and the Netherlands that began in November 2022.

BBC News

@bobdobberson haha, that is also an option...

Why not just reach out to some local companies doing DFIR? I'm sure some agreement is possible?

Or find some DFIR rooms on platforms like HackTheBox, TryHackMe etc.

Or DFIR forums? YT video's?

@bobdobberson what do you mean exactly?

You want to practice red-teaming shoulder surfing?

Or learn about DFIR indicators that SS has happened?