32 Followers
147 Following
333 Posts
Cybersecurity Engineer. 
Boston Terrier lover. 
USN ⚓️ veteran, Hospital Corpsman. OEF/OIF.

The value-proposition of building and maintaining an internal Threat Hunting team...

https://www.hexacorn.com/blog/2024/08/02/the-value-proposition-of-building-and-maintaining-an-internal-threat-hunting-team/

The value-proposition of building and maintaining an internal Threat Hunting team… | Hexacorn

CrowdStrike complained to Cloudflare about a CrowdStrike parody site… and Cloudflare took it down. Without a court order. https://clownstrike.lol/crowdmad/

Cloudflare recently announced they have become a strategic partner with CrowdStrike: https://www.cloudflare.com/en-gb/press-releases/2024/crowdstrike-and-cloudflare-announce-expanded-strategic-partnership-to-secure/

Clown Services Company - Unregistered Agent, Incompliance, Welfare, Debt Market, Analog, and Imaginary-Risk Solutions

🌟 Since the release of GPTs many people started to experiment with their own agent, which allows to craft a bot for a specific use case.

🛡️ Yesterday I created an 'Awesome' repository that catalogs all the GPTs used for cybersecurity. And the list keeps growing!

Have a look to it and feel free to add yours! 👇 #infosec #gpts #ia #llms

https://github.com/fr0gger/Awesome-GPT-Agents

GitHub - fr0gger/Awesome-GPT-Agents: A curated list of GPT agents for cybersecurity

A curated list of GPT agents for cybersecurity. Contribute to fr0gger/Awesome-GPT-Agents development by creating an account on GitHub.

GitHub
Was such an honor to be a guest on Simply Cyber yesterday with @Gerald_Auger - such great questions about breaking into #DFIR! Thanks for everyone who joined and asked awesome questions. Missed it? You can check it out here #Infosec https://www.youtube.com/live/F2W2zwPvahY?si=jKRFUP687pQucvN5
Breaking Into DFIR: Is It Entry-Level? With Special Guest Jessica Hyde

YouTube
Robby East - Center Of Gravity

Tickets are on sale now for This Never Happened Presents Australia. https://thisneverhappened.ffm.to/live Robby East returns to the label with the single 'Center Of Gravity' Stream: https://thisnever

SoundCloud
The exact same protocol, but without RC4 encryption, was also reverse engineered by Vitali Kremez (RIP 💜) in his ”Let’s Learn: Trickbot Socks5 Backconnect Module In Detail” blog post from 2017.
#TrickBot #TeamSpy #Socks5Systemz
https://vk-intel.org/2017/11/21/lets-learn-trickbot-socks5-backconnect-module-in-detail/
Let’s Learn: Trickbot Socks5 Backconnect Module In Detail

Goal: Reverse the Trickbot Socks5 backconnect module including its communication protocol and source code-level insights. Source: Decoded Trickbot Socks5 backconnect module(33ad13c11e87405e277f002e…

Reverse Engineering, Malware Deep Insight

Recorded Future has a report on how Chinese APTs have evolved over time.

The report also includes this map of the suspected locations of Chinese APT groups.

https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power

Charting China’s Climb as a Leading | Recorded Future Global Cyber Power

Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years.

The operators of the Kinsing malware are targeting cloud environments with systems vulnerable to "Looney Tunables," a Linux security issue identified as CVE-2023-4911 that allows a local attacker to gain root privileges on the system.

https://www.bleepingcomputer.com/news/security/hackers-exploit-looney-tunables-linux-bug-steal-cloud-creds/

Hackers exploit Looney Tunables Linux bug, steal cloud creds

The operators of the Kinsing malware are targeting cloud environments with systems vulnerable to "Looney Tunables," a Linux security issue identified as CVE-2023-4911 that allows a local attacker to gain root privileges on the system.

BleepingComputer