The Cyber Unc

1.4K Followers
709 Following
1.4K Posts

Above-average tech nerd. Husband. Father. Millennial. Associate C|CISO.

I work in IT with a focus on Managed Services and Cybersecurity, helping small and midsize orgs stay online and less on fire.

Interests include:
#CyberSecurity #InfoSec #Privacy #IT #RMM #SysAdmin #Python #Apple #iOS #Tech

searchable
Formerly (@beardedtechguy)

Bloghttps://www.kylereddoch.me
Socialshttps://profile.kylereddoch.me
GitHubhttps://github.com/kylereddoch
/Useshttps://www.kylereddoch.me/uses/
Support my workhttps://www.kylereddoch.me/donate/
White House moves to give federal agencies access to Anthropic’s Claude Mythos

The move would allow civilian agencies to access a modified version of Anthropic’s powerful vulnerability‑hunting AI, under safeguards designed to limit misuse.

CSO Online

Yet another data breach for medical centers.

Cookeville Regional Medical Center hospital data breach impacts 337,917 people https://securityaffairs.com/190898/cyber-crime/cookeville-regional-medical-center-hospital-data-breach-impacts-337917-people.html

#ransomware #infosec #cybersecurity

Cookeville Regional Medical Center hospital data breach impacts 337,917 people

A ransomware attack on a Tennessee hospital exposed data of 337,000 people after hackers stole 500GB of sensitive information.

Security Affairs
Foxit, LibRaw vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed one Foxit Reader vulnerability, and six LibRaw file reader vulnerabilities. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy.     For Snort coverage that can detect the exploitation

Cisco Talos Blog

This exploit is for a local privilege escalation (LPE) flaw that grants SYSTEM privileges in Windows 10, Windows 11, and Windows Server on the latest April Patch Tuesday patches, when Windows Defender is enabled.

New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges https://www.bleepingcomputer.com/news/microsoft/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges/

#cybersecurity #zeroday #windows

New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges

A researcher known as "Chaotic Eclipse" has published a proof-of-concept exploit for a second Microsoft Defender zero-day, dubbed "RedSun," in the past two weeks, protesting how the company works with cybersecurity researchers.

BleepingComputer

New #blogpost

I have come to share what I've done, some more confessions from a FOSS enthusiast...

https://joelchrono.xyz/blog/more-confessions-from-a-foss-enthusiast/

This is day 53 of #100DaysToOffload

#blogging #selfhosting #degoogle #foss

More confessions from a FOSS enthusiast

There are ideas and values and practices that a FOSS enthusiast should follow, but well, sometimes I'm lazy

Just finished watching #SkyKing on Hulu. As someone who suffers from mental health issues, this documentary of the account of Beebo’s adventure in the Q400 hits a little close to home.

“I’m just a guy with a few screws loose”. 😭😩

#MentalHealth #MentalHealthAwareness

When your significant other spills her creamer’d up coffee on one of your mechanical keyboards.

#mechanicalkeyboards #keyboards

New. There's more, but this is getting too long.

Zscaler: Payouts King Takes Aim at the Ransomware Throne https://www.zscaler.com/blogs/security-research/payouts-king-takes-aim-ransomware-throne

Picus: CVE-2026-21643: Critical SQL Injection in Fortinet FortiClient EMS Exploited in the Wild https://www.picussecurity.com/resource/blog/cve-2026-21643-critical-sql-injection-in-fortinet-forticlient-ems-exploited-in-the-wild

Microsoft: Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/

Sohos: QEMU abused to evade detection and enable ransomware delivery https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery @SophosXOps

Sekoia: From APT28 to RePythonNET: automating .NET malware analysis https://blog.sekoia.io/apt28-to-repythonnet-automating-net-malware-analysis/ @sekoia_io

Proopoint: Beyond the breach: inside a cargo theft actor’s post-compromise playbook https://www.proofpoint.com/us/blog/threat-insight/beyond-breach-inside-cargo-theft-actors-post-compromise-playbook

Group-IB: W3LL Unmasked https://www.group-ib.com/blog/w3ll-phishing-ecosystem-takedown/

Posted yesterday:

Halcyon: 44% and Rising: What the Automotive Industry's Ransomware Problem Tells Us About Where Attacks Are Heading https://www.halcyon.ai/blog/44-percent-and-rising-automotive-ransomware #infosec #threatresearch #ransomware #threatintel #threatintelligence #Python #Fortinet #SQL #Apple #macOS #Microsoft #cybercrime

Payouts King Takes Aim at the Ransomware Throne | ThreatLabz

Prior BlackBasta initial access brokers are conducting new attacks; stealing large amounts of data, and selectively deploying Payouts King ransomware.

I've taking the rest of the week off. I'm needing some time to clear my head and reset.

Mental Health sucks...

#mentalhealth

New by me: Secure Browsers Push Zero Trust Past the Login Screen

I wrote about why secure browsers matter beyond just getting a user signed in. If modern work happens in the browser, then trust decisions, session controls, and data protections need to keep happening there too.

https://www.kylereddoch.me/blog/secure-browsers-push-zero-trust-past-the-login-screen/

#Cybersecurity #Infosec #ZeroTrust #BrowserSecurity

Secure Browsers Push Zero Trust Past the Login Screen

Zero trust does not end when a user signs in. Secure browsers help enforce trust during the live session, where users are actually clicking, copying, uploading, downloading, and moving sensitive data.

CybersecKyle