hrbrmstr

@hrbrmstr@infosec.exchange
708 Followers
59 Following
86 Posts
Pampa•Don't look @ me…I do what he does—just slower. #rstats avuncular•👨‍🍳•✝️•💤•Varaforseti í Gögn Vísindi @ @greynoiseio + @carnegiemellon lecturer #BLM🇺🇦
GitHubhttps://github.com/hrbrmstr
rud.ishttps://rud.is/

🎥 Discover how GreyNoise uses AI to uncover zero-days, collaborate with vendors, + protect users from critical cybersecurity threats in our latest webinar.

🔗 Watch the full video today: https://info.greynoise.io/webinar/zero-day-vulnerability-ai

GreyNoise Webinar - Zero-Day Vulnerabilities Using AI

In this webinar we reveal how GreyNoise intercepted an attacker deploying a zero-day exploit in IoT-connected cameras, and how AI detected threats that would otherwise go unnoticed.

Our very own @Dio9sys joins @runZeroInc Hour next week to discuss her x-files of fascinating payloads and explore the latest in threat intel and vulns. You're not gonna want to miss this! 👾 https://runzero.zoom.us/webinar/register/WN_mk62HbrzTaO6Fd9MO7LKCw#/registration
Welcome! You are invited to join a webinar: runZero Hour, Episode 7. After registering, you will receive a confirmation email about joining the webinar.

Tune in for a special episode of runZero Hour as we welcome our first guest, Brianna Cluck from GreyNoise! This month, we'll dive into Brianna's "x-files," her collection of fascinating payloads, and recent revelations from the threat intel landscape. We'll also dissect the latest vulnerabilities and round out the hour with our Rapid Response round-up, including some new OT threats. Finally, we'll be chatting about some new, exciting features in the runZero Platform.

Zoom
Curious about this Thursday's "Cybersecurity in the Age of AI" webinar, but want to know just a bit more before signing up? Our panelists share some insights into what we are going to dive into later this week.
https://www.greynoise.io/blog/cybersecurity-in-the-age-of-ai-what-experts-are-saying
Cybersecurity in the Age of AI: What Experts are Saying | GreyNoise Blog

In this post we explore the significant shift in the cybersecurity landscape driven by AI advancements. Featuring insights from a panel of seasoned security experts, the blog delves into current misconceptions, exciting developments, and surprising findings in AI-driven cybersecurity.

The 2024 Verizon #DBIR is out and it's the Year of the Vuln, as exploit attempts surge + orgs struggle to patch in time. Check out our analysis on the evolving landscape + how GreyNoise helps ID targeted attacks faster + buys remediation time. 🦾 https://buff.ly/3JJK6WR
2024 Verizon DBIR: Surviving the Year of the Vuln | GreyNoise Blog

Go inside the 2024 Verizon Data Breach Investigations Report (DBIR) to discover key takeaways and insights as GreyNoise analyzes the rise of vulnerability exploitation in cyber attacks.

Calling all 1337 h4x0rs: We leveled up by publishing our 1,337th tag! 🎉 A significant part of this milestone is due to the development of our AI-powered Sift tool, catching exploits of both modern and ancient CVEs.

https://www.greynoise.io/blog/greynoise-tags-its-way-to-1337-elite-status

GreyNoise Tags Its Way to 1337 Elite Status | GreyNoise Blog

GreyNoise celebrates reaching its 1,337th tag, attributing its success to the practical use of AI, particularly the creation of Sift. This has led to increased tag creation and expanded coverage of vulnerabilities.

The #golang `gorilla/sessions` directory traversal and file (over)write is now being tracked as GO-2024-2730: https://go-review.googlesource.com/c/vulndb/+/579655

This issue was (co)-discovered as part of watchTowr's analysis of the Palo Alto Networks RCE (#CVE_2024_3400), but is entirely separate, and affects a wide range of Go-based web services.

https://github.com/golang/vulndb/issues/2730

If you use gorilla/sessions with the FilesystemStore, please switch to the CookieStore instead until a patch is available.

⚠️ New Vuln: CVE-2024-3273 ⚠️ Active exploitation of a remote code execution vulnerability in D-Link NAS devices, affecting as many as 92,000 devices. Check out the blog for further details + check your router's UPnP configuration. https://buff.ly/3U8YHB2
CVE-2024-3273: D-Link NAS RCE Exploited in the Wild | GreyNoise Blog

Check out this blog to stay informed about a critical remote code execution vulnerability affecting D-Link NAS devices. It is being tracked under CVE-2024-3273 and believed to affect as many as 92,000 devices.

Join us next Tuesday at 12:30 ET, we're breaking down honeypots + their game-changing role in cybersecurity. Secure your spot now - don't let threats buzz under your radar! 🍯🕵️‍♂️
https://buff.ly/4csVjZa
GreyNoise Webinar - The Future of Honeypots in an Age of Targeted Attacks

This webinar focuses on the role of honeypots in cybersecurity defense, addressing challenges in their adoption and highlighting their value in threat intelligence amidst targeted attacks.

The GreyNoise 2023 Internet Exploitation Retrospective Report is LIVE. Our team decodes 2023's cyber landscape with critical exploits, key stats + insights for proactive defense. Stay ahead and download now!

https://www.greynoise.io/resources/2023-greynoise-retrospective-internet-exploitation-report

GreyNoise 2023 Internet Exploitation Retrospective Report

The GreyNoise 2023 Internet Exploitation Retrospective Report provides insights into major cyber threats and vulnerabilities observed throughout the year.

We have our very own @morris on Storm ⚡️ Watch tomorrow to kick off 2024. You're not gonna want to miss this episode! https://www.greynoise.io/resources/storm-watch-weekly-livestream
Storm Watch: Weekly Livestream

Every Monday we share data on recent vulnerabilities, emerging threats, and a whole lot more.