digicat@infosec.pubMEnglish · 3 days agoCTO at NCSC Summary: week ending January 18thplus-squarepinctoatncsc.substack.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCTO at NCSC Summary: week ending January 18thplus-squarepinctoatncsc.substack.comdigicat@infosec.pubMEnglish · 3 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 5 hours agosdc: Self Decrypting Binary Generatorplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linksdc: Self Decrypting Binary Generatorplus-squaregithub.comdigicat@infosec.pubMEnglish · 5 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 13 hours agoVoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun - hyperbole warning - "advanced" as opposed to human productivity enhancedplus-squareresearch.checkpoint.comexternal-linkmessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkVoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun - hyperbole warning - "advanced" as opposed to human productivity enhancedplus-squareresearch.checkpoint.comdigicat@infosec.pubMEnglish · 13 hours agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 13 hours agoMalware Peddlers Are Now Hijacking Snap Publisher Domainsplus-squareblog.popey.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMalware Peddlers Are Now Hijacking Snap Publisher Domainsplus-squareblog.popey.comdigicat@infosec.pubMEnglish · 13 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 13 hours agoOperation Nomad Leopard: Targeted Spear-Phishing Campaign Against Government Entities in Afghanistanplus-squarewww.seqrite.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkOperation Nomad Leopard: Targeted Spear-Phishing Campaign Against Government Entities in Afghanistanplus-squarewww.seqrite.comdigicat@infosec.pubMEnglish · 13 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoPro-Russia hacktivist activity continues to target UK organisationsplus-squarewww.ncsc.gov.ukexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkPro-Russia hacktivist activity continues to target UK organisationsplus-squarewww.ncsc.gov.ukdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoHow to Get Scammed (by DPRK Hackers)plus-squaremedium.comexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkHow to Get Scammed (by DPRK Hackers)plus-squaremedium.comdigicat@infosec.pubMEnglish · 2 days agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 2 days agoDetection of Kerberos Golden Ticket Attacks via Velociraptorplus-squaredetect.fyiexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkDetection of Kerberos Golden Ticket Attacks via Velociraptorplus-squaredetect.fyidigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoIranian MOIS operating from Starlinkplus-squareinfosec.pubimagemessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1imageIranian MOIS operating from Starlinkplus-squareinfosec.pubdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoMega RMM KQL Queryplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMega RMM KQL Queryplus-squaregithub.comdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoMonitor New Actions in Sentinel & Defender XDR (V2)plus-squarekqlquery.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMonitor New Actions in Sentinel & Defender XDR (V2)plus-squarekqlquery.comdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoWhat's in the box !? - 'we were able to obtain a set of pen-testing tools from an active pen-tester and security analyst in China'plus-squareopen.substack.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkWhat's in the box !? - 'we were able to obtain a set of pen-testing tools from an active pen-tester and security analyst in China'plus-squareopen.substack.comdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 3 days agoBad Vibes: Comparing the Secure Coding Capabilities of Popular Coding Agentsplus-squareblog.tenzai.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkBad Vibes: Comparing the Secure Coding Capabilities of Popular Coding Agentsplus-squareblog.tenzai.comdigicat@infosec.pubMEnglish · 3 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 3 days agoGhostVEH: Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectoredExceptionHandler.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkGhostVEH: Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectoredExceptionHandler.plus-squaregithub.comdigicat@infosec.pubMEnglish · 3 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 3 days agoanamnesis-release: Automatic Exploit Generation with LLMsplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkanamnesis-release: Automatic Exploit Generation with LLMsplus-squaregithub.comdigicat@infosec.pubMEnglish · 3 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agosliver-tor-bridge: Tor transport bridge for Sliver C2 - anonymous command and controlplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linksliver-tor-bridge: Tor transport bridge for Sliver C2 - anonymous command and controlplus-squaregithub.comdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 3 days agoOperation Poseidon: Spear-Phishing Attacks Abusing Google Ads Redirection Mechanismsplus-squarewww.genians.co.krexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkOperation Poseidon: Spear-Phishing Attacks Abusing Google Ads Redirection Mechanismsplus-squarewww.genians.co.krdigicat@infosec.pubMEnglish · 3 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 3 days ago6-day and IP Address Certificates are Generally Availableplus-squareletsencrypt.orgexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-link6-day and IP Address Certificates are Generally Availableplus-squareletsencrypt.orgdigicat@infosec.pubMEnglish · 3 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 3 days agoInside a Malicious Push Network: What 57M Logs Taught Usplus-squarewww.infoblox.comexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkInside a Malicious Push Network: What 57M Logs Taught Usplus-squarewww.infoblox.comdigicat@infosec.pubMEnglish · 3 days agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 3 days ago5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systemsplus-squaresocket.devexternal-linkmessage-square1linkfedilinkarrow-up17arrow-down11
arrow-up16arrow-down1external-link5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systemsplus-squaresocket.devdigicat@infosec.pubMEnglish · 3 days agomessage-square1linkfedilink