394 Followers
65 Following
273 Posts
Dad, Husband, driven Security leader & team builder/player. Advisor from time to time. Thriving in large complex environments, ideally focusing on Purple/Red team☠️ and Security Engineering ⚙️ challenges. Passion for National Security 🇺🇸🇨🇦🇫🇷, Coding 💻 Space 🚀
Relaxing includes Books, Blitz Chess, Music & Gaming 🕹️(whenever able to free some zeptoseconds).
Linkedinhttps://linkedin.com/in/jmamblat
Threemahttps://threema.id/6B4FR572
GitHubhttps://github.com/sourcefrenchy

“In a first, cryptographic keys protecting SSH connections stolen in new attack” (in other words, you should have adopted ed25519 for some time already ;) #informationsecurity #cybersecurity #cryptography #ssh #crypto #securityresearch

https://arstechnica.com/security/2023/11/hackers-can-steal-ssh-cryptographic-keys-in-new-cutting-edge-attack/

In a first, cryptographic keys protecting SSH connections stolen in new attack

An error as small as a single flipped memory bit is all it takes to expose a private key.

Ars Technica
ldd arbitrary code execution

The `ldd` utility is more vulnerable than you think. It's frequently used by programmers and system administrators to determine the dynamic library dependencies of executables. Sounds pretty innocent, right? Wrong! In this article I am going to show you how to create an executable that runs arbitrary code if it's...

#Malware Unpacking With Memory Dumps - Intermediate Methods (Pe-Sieve, Process Hacker, Hxd and Pe-bear)

https://embee-research.ghost.io/unpacking-malware-using-process-hacker-and-memory-inspection/

Malware Unpacking With Memory Dumps - Intermediate Methods (Pe-Sieve, Process Hacker, Hxd and Pe-bear)

Demonstrating three additional methods for obtaining unpacked malware samples. Using Process Hacker, Pe-sieve, Hxd and Pe-bear.

Embee Research
2023 Microsoft Office XSS

Found by @adm1nkyj and @justlikebono

PKSecurity
3 iOS 0-days, a cellular network compromise, and HTTP used to infect an iPhone

Apple patches 3 zero-days after they were used in a sophisticated attack.

Ars Technica

“backdoor commands are not implemented in the Deadglyph binary; instead, they are dynamically received from its C&C server in the form of additional modules that exist in memory only briefly, to perform the commands” #cybersecurity #infosec #blueteam #malware #dfir

https://thehackernews.com/2023/09/deadglyph-new-advanced-backdoor-with.html

Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics

Researchers uncovered a new advanced backdoor, 'Deadglyph,' by Stealth Falcon hackers, which combines two languages for cyber espionage.

The Hacker News
Bypassing Windows Defender and PPL Protection to dump LSASS without Detection | Adversary Tactics and Tradecraft | Tactical Adversary

Bypassing Windows Defender and PPL Protection with PPLBlade to dump LSASS without Detection.

Great deep-dive, “NPM Package Masquerading as Email Validator Contains C2 and Sophisticated Data Exfiltration” #supplychain #npm #blueteam #cybersecurity #infosec

https://blog.phylum.io/npm-emails-validator-package-malware/

NPM Package Masquerading as Email Validator Contains C2 and Sophisticated Data Exfiltration

On the morning of August 24, Phylum's automated risk detection system identified a suspicious package published to npm called “emails-helper." A deeper investigation revealed that this package was part of an intricate attack involving Base64-encoded and encrypted binaries. The scheme fetches encryption keys from a DNS TXT record hosted on

Phylum

Bypassing #bitlocker using a cheap logic analyzer on a Lenovo laptop
#cybersecurity #infosec

https://www.errno.fr/BypassingBitlocker.html

Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop

gquere.github.io