344 Followers
314 Following
84 Posts
There's always more to the story than you know.
http://ericazelic.medium.com
IUnknown
Security Consultant
The bird site is saying I've reached my daily limit of follows too. I haven't followed anyone new today LOL
ℹ️ Note: Twitter is experiencing international outages affecting website, mobile app and features including posting and retweeting; incident not related to country-level internet disruptions or filtering #TwitterDown
Welp, the bird site is broken. It says I've reached my daily tweet limit... after 3 tweets.

For this edition of Insomni'hack #INS23, I created my first ever Windows challenge. 🤗​ It is inspired by what I do when I search for userland LPE/RCE vulnerabilities. 😉​

I'm not a #CTF player myself, but I bet this type of challenge is rather uncommon.

If you wish to participate, here is the link. 🙂​

https://teaser.insomnihack.ch/

Insomni'hack Teaser - Insomni'hack Teaser

If you call mshtml to run inline VBScript active directory enumerations from a position independent shellcode beacon, will it get blocked? This is the question I will answer this weekend.

What are you doing this weekend? Oh that's right, most of you are at schmoo

I always talk about how useful Data Brokerage sites are in human hacking (they're the first step in OSINT before launching the attack). Which is why I'm stoked to be partnering with delisting company DeleteMe on a virtual event January 25th at 1pm ET where I chat with CEO Rob Shavell about how I use Data Brokerage sites in my hacking, why I recommend delisting to everyone for their security and privacy, and have a live Q&A with the audience. Please join us for this free event, all are welcome. https://b2b.joindeleteme.com/webinar-january-2023
DeleteMe Webinar

Join us on 1/25/23 with privacy expert Rob Shavell, CEO of DeleteMe, and ethical hacker Rachel Tobac, CEO of Social Proof Security.

I wrote a blog post for work recently about how to prioritize vulnerabilities so you can meaningfully improve your security posture even without fixing all-of-the-things.
https://www.crowdstrike.com/blog/how-to-leverage-crowdstrike-falcon-spotlight-to-prioritize-vulnerabilities/
How to Leverage CrowdStrike Falcon Spotlight to Prioritize Vulnerabilities

This blog highlights the importance of effectively prioritizing vulnerabilities and shows how Falcon Spotlight can be used to do so effectively and with minimal effort.

crowdstrike.com
Infosec.exchange crossed 40000 accounts a few minutes ago. 7 weeks ago, we had ~180 active accounts.

Like a bad penny, an effective malware-propagation tactic will just keep turning up.

We note with interest that other security researchers have also recently spotted the venerable sideloading attack we wrote about earlier this month... #infosec #threatintel #ioc #TheWormCircus

https://news.sophos.com/en-us/2022/11/03/family-tree-dll-sideloading-cases-may-be-related/

Family Tree: DLL-Sideloading Cases May Be Related

A threat actor’s repeated use of DLL-hijack execution flow makes for interesting attack results, including omnivorous file ingestion; we break down five cases and find commonalities

Sophos News