437 Followers
144 Following
344 Posts
Professional Googler / #ThreatIntel 🔍
 | Here for the TTPs and swag
 | Toots are mine | Member @CuratedIntel
Twitterhttps://twitter.com/seadev3
I’ll never not laugh when someone audibly says “qishing”.
Fortra warns of new critical GoAnywhere MFT auth bypass, patch now

Fortra is warning of a new authentication bypass vulnerability impacting GoAnywhere MFT (Managed File Transfer) versions before 7.4.1 that allows an attacker to create a new admin user.

BleepingComputer
3/10 coaster - cute, but very inefficient.
Results of Major Technical Investigations for Storm-0558 Key Acquisition | MSRC Blog | Microsoft Security Response Center

Results of Major Technical Investigations for Storm-0558 Key Acquisition

I tried to pick up Breath of the Wild three different times but am instantly hooked on Tears of the Kingdom. I recommend TotK it if you were feeling same about BotW. Controls are so much more intuitive and the abilities are hella fun.
Have you ever despised a security tool so much you wanted to be the SME for it to be sure your hatred was valid?

Fantastic release from CISA, NSA, and many others highlighting use of living off the land techniques employed by Chinese threat actors.

Your EDRs won't save you from LOLBin use, you'll usually need to write custom rules to get that coverage.
https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF

I got a new lens for Mother’s Day so I can take even better photos of my daughter throwing tantrums 🥰 #peaceisneveranoption

Microsoft named threat actor or fun ice cream flavor? 🍨

Peach Sandstorm
Midnight Blizzard
Raspberry Typhon
Caramel Tsunami
PISTACHIO TEMPEST

https://www.microsoft.com/en-us/security/blog/2023/04/18/microsoft-shifts-to-a-new-threat-actor-naming-taxonomy/

Microsoft shifts to a new threat actor naming taxonomy | Microsoft Security Blog

Microsoft is excited to announce that we are shifting to a new threat actor naming taxonomy aligned to the theme of weather.

Microsoft Security Blog

Top tier use of intel

"... hacktivists ordered several dozen different items to the address linked to his account, including souvenirs with the FBI logo (by which he is wanted) as well as a large shipment of adult toys, which they paid for with his card."

https://informnapalm.org/en/hacked-russian-gru-officer/

Hacked: Russian GRU officer wanted by the FBI, leader of the hacker group APT 28

Ukrainian hacktivist team Cyber Resistance hacked the email of Lieutenant Colonel Sergey Alexandrovich Morgachev, an officer of the Russian Main Intelligence Directorate of the General Staff of the Russian Army (GRU), leader of the Russian hacker group APT 28, consisting of officers of the 85th Main Special Service Center of the GRU, military unit #26165.

InformNapalm.org (English)