3 Followers
54 Following
82 Posts
In #infosec we trust.
Dad, Husband, Security leader & team player // Purple/Red team☠️ Security Engineering ⚙️ National Security 🇺🇸🇨🇦🇫🇷 Coding 💻 Space 🚀 Gaming 🕹️
LinkedInhttps://linkedin.com/in/jmamblat
Threemahttps://threema.id/6B4FR572
GitHubhttps://github.com/sourcefrenchy
Twitterhttps://mobile.twitter.com/sourcefrenchy

Velociraptor 0.6.7 is now out! Read the release notes here https://docs.velociraptor.app/blog/2022/2022-11-21-release-notes/ describing all the new cool features.

Thanks to all the contributors to make this release awesome 😎

Velociraptor 0.6.7 Release :: Velociraptor - Digging deeper!

Velociraptor Release 0.6.7 is now LIVE. This post discusses some of the new features.

The Australian Cyber Security Centre (ACSC) released "Exercise in a box". Goal is to give orgs easy access to exercise material in regards to cyber-security incidents.

"Exercise in a Box guides users through cyber security exercises and includes everything you need to plan, set up and deliver the exercises to your organisation. It also includes a post activity report function that allows you to capture any findings you make during the exercise and use these findings to make meaningful changes to your cyber security posture."

https://www.cyber.gov.au/exercise-in-a-box #CyberSecurity #InfoSec #Training #Exercise #Ransomware #BYOD

Tails - Tails 5.7 is out

Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice | Proofpoint US

Proofpoint

MISP 2.4.165 released with many improvements in the workflow, bugs fixed and security fixes.

https://www.misp-project.org/2022/11/21/MISP.2.4.165.released.html/

Don't forget to update MISP.

#misp #threatintel #threatintelligence

A huge thanks to the contributors and especially the participants of the FIRST.org CTI workshop for the feedback during the workflow training.

MISP 2.4.165 released with many improvements, bugs fixed and security fixes.

MISP Threat Intelligence & Sharing

MISP Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing
macOS Sandbox Escape vulnerability via Terminal

Introduction In 2020 I observed a strange behavior a sandboxed macOS app may launch any application that won’t inherit the main app’s sandbox profile. It was even funnier as the sandboxed app can spawn those new apps with environment variables. I of course reported it to Apple, but I was told that it’s expected behavior. From that time there were at least 2 publicly-disclosed vulnerabilities that exploited the above-mentioned behavior:

Super happy to help share and spread the word for Matt Kiely's latest masterpiece, "Responsible Red Teaming" available for free, right now on the Taggart Institute. A great initiative for all the right reasons.

https://www.youtube.com/watch?v=IQX7pU_pyYc

Your choices matter… Responsible Red Teaming w/ HuskyHacks

YouTube

RT @t3l3machus
"The quieter you become, the more you are able to hear." #kalilinux

OR you can try my approach:

New AxLocker ransomware encrypts files, then steals your Discord account

The new 'AXLocker' ransomware family is not only encrypting victims' files and demanding a ransom payment but also stealing the Discord accounts of infected users.

BleepingComputer

Spotted in Philadelphia's Chinatown last night. No dial tone, sadly.

#2600 #PayPhones #phreaking