CTO at NCSC Summary: week ending August 3rd
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
Beyond the Patch: SharePoint Exploits and the Hidden Threat of IIS Module Persistence
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Hunting for Secrets in Plain Sight: Leveraging Internal Logging and Monitoring Services
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
UNC2891 Bank Heist: Physical ATM Backdoor & Linux Forensic Evasion Evasion
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
CTO at NCSC Summary: week ending August 3rd
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
#OFTW v3.0 - 'Objective for the We' v3.0 - London, July 2025 - slides and videos
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Plague: A Newly Discovered PAM-Based Backdoor for Linux
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Warren is an open-source security alert management system that automates the tedious parts of alert triage. It ingests alerts from your existing tools, enriches them with AI and threat intelligence, and helps you focus on actual incidents instead of noise.
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Illumina Inc. to Pay $9.8M to Resolve False Claims Act Allegations Arising from Cybersecurity Vulnerabilities in Genomic Sequencing Systems
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Naming country linked to UNC3886 attack not in Singapore’s best interest at this point in time: Shanmugam
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Exploiting the Synology TC500 at Pwn2Own Ireland 2024
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Let’s Be Objective: A Deep Dive into 0bj3ctivityStealer's Features
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
XWorm V6: 高度な回避機能と AMSI バイパス機能が明らかに - XWorm V6: Advanced Evasion and AMSI Bypass Capabilities Revealed
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
2025 GenAI Code Security Report: ASSESSING THE SECURITY OF USING LLMS FOR CODING
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
machofile: machofile is a module to parse Mach-O binary files
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
autoswagger: Autoswagger by Intruder - detect API auth weaknesses
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
ICANN writes letter to Web Commerce Communications Limited dba WebNic.cc for not dealing with DNS domain abuse reports
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
When Privileged Access Falls into the Wrong Hands: Chinese Companies in Microsoft’s MAPP Program
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Microsegmentation in Zero Trust Part One: Introduction and Planning | CISA
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
More than 90 state, local governments targeted using Microsoft SharePoint vulnerability, group says
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Introducing Unit 42’s Attribution Framework
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
RingReaper: Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.
Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world. Our primary home is on Lemmy after the great ban debacle for 2025.