Joe Słowik

@jfslowik@infosec.exchange
3.2K Followers
412 Following
2.1K Posts

#Infosec, #CTI, and #ICS & Critical Infra Things
https://pylos.co

Also be on the alert for posts on heavy metal, sports ball (or black, cylindrical rubber object game 🏒), and various #shitposting.

Main job: analyzing the threats and doing the #CTI at Huntress

Sidejob: #CTI and #ICS/#OT training and consulting through Paralus LLC (https://paralus.co)

Happy participant in TootFinder #tfr

Personal Webhttps://pylos.co
Paralus Webhttps://paralus.co
LinkedInhttps://www.linkedin.com/in/joe-slowik/
GitHub (shitty)https://github.com/serrastusbear
In fairness actual details are provided by Cisco just in an unlinked Talos blog separate from the security advisory...
https://blog.talosintelligence.com/uat-9686/
UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager

Cisco Talos is tracking the active targeting of Cisco AsyncOS Software for Cisco Secure Email Gateway, formerly known as Cisco Email Security Appliance (ESA), and Cisco Secure Email and Web Manager, formerly known as Cisco Content Security Management Appliance (SMA).

Cisco Talos Blog
CVE-2025-20393
Sigh IDS not getting any love here
The Humpty Dumpty Theory of Threat Actor Naming Schema
F'ing vaporware
Your IP Address Might Be Someone Else's Problem (And Here's How to Find Out)

Your home network might be part of someone else’s attack. GreyNoise IP Check shows if your IP’s been caught scanning the internet—free and private.

I'm offering a rare public, online session of my Applied #CTI #CyberThreatIntelligence training course in January for an evening North America/morning Australia/Asia timeframe, regiter your interest today!
https://forms.gle/i3n4srD6hWzfaX999
Paralus LLC: Applied Threat Intelligence

Hello and thank you for your interest in a workshop focusing on Applied Threat Intelligence! Scheduling: 12-16 January 2026 (Five Days) 1700-1900 US Eastern/2200-0000 Central European/0900-1100 Australian EDT (Two Hours/Day) Cost: $650 USD Workshop Description: When used properly, cyber threat intelligence allows an organization to leverage another’s breach or incident to their own benefit. Yet while many cyber threat intelligence courses and guides exist, these are primarily designed for developing long-range, in-depth intelligence products for strategic or similar overview with an overemphasis on theory and little experience in practice. Applied threat intelligence instead supports a different audience: day to day security work and network defense. While cyber threat intelligence must always meet standards for accuracy, relevancy, and timeliness, SOC watch-standers and IR personnel need enriched, good-enough information now over “the best” information later in order to execute their jobs. This course fills a critical role that other training does not address: how to successfully embed cyber threat intelligence operations into the daily rhythm of security to support everyday tasks, and extraordinary incidents. Toward that end, while this course will touch on theoretical concepts such as kill chain methodology, Diamond Model clustering, and other ideas, the real focus will be on what efforts make operational threat intelligence possible and sustainable: Establishing roles, responsibilities, and service agreements in advance. Determining priorities, intelligence requirements, and customer threat landscape. Molding threat intelligence information to security tools to make enriched information useful and actionable. How to analyze internal and external data sources to extract actionable threat intelligence for operational defenders. An extensive walk-through of IOC analysis, pivoting, and information enrichment to demonstrate how to better equip defenders to respond to emerging threats. Discussions on reporting, feedback, and closing the intelligence loop to definitively show how threat intelligence operations link to SOC, IR, and security policy entities. Building and maintaining lines of communication between intelligence and operations personnel to drive ideal outcomes in security event analysis and closure. A complete overview and syllabus can be found at this link. This form is to gauge interest and rough attendance for the proposed event. If a sufficient number of attendees sign up for this proposed workshop, those interested will receive an invoice for the cost of training via PayPal. Payment is required in full prior to the event to ensure cost coverage and commitment to attending. If an insufficient number of persons submit payment for the course, the event will be cancelled no later than three weeks in advance of the proposed event date. Attendees will receive a certificate of completion following the course to record for training and CPE purposes on request.

Google Docs
Your CVSS 9.0 isn't the same as my CVSS 9.0