Kyle - chaoticflaws.bsky.social 🇺🇦

11.2K posts

Kyle - chaoticflaws.bsky.social 🇺🇦 banner
Kyle - chaoticflaws.bsky.social 🇺🇦

Kyle - chaoticflaws.bsky.social 🇺🇦

@chaoticflaws

I'm a forensicating addict, President of MISEC Nonprofit, MiseCon/Converge/BSides Detroit Organizer, CSO Antigen Security #MISEC #DFIR https://t.co/cPof2JggDD

Beigetreten Nisan 2014
1.4K Folgt975 Follower
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.mdfile that primes Claude with expert-level methodology for a specific attack surface from SQLi to shellcode, EDR evasion to exploit development. Resource: github.com/SnailSploit/Cl…
7h3h4ckv157 tweet media
English
4
111
811
44.6K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Tom Dörr
Tom Dörr@tom_doerr·
Ethical open-source intelligence graph exploration tool github.com/reconurge/flow…
Tom Dörr tweet media
English
5
133
896
36.8K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Kostas
Kostas@Kostastsale·
This is one of the more fascinating malware write-ups I've read in a while. Sentinel LABS covered fast16, a 2005 sabotage framework that was doing things most people associate with much later operations. The malware used a driver to tamper with calculation software, but it also had automated methods to propagate through the network. It looked for the right applications, used Windows-native mechanisms, and took advantage of shared drives with weak passwords or no passwords. This is a good takeaway because the sabotage only works well if the corrupted results become consistent across systems, so if one workstation gives bad results, someone may spot it. Having the testing and validation documents in the same flat network makes tampering easier. Also, the mechanisms used to tamper with research are fascinating. A chain of operations starting from a filesystem driver, and very specific software targeting. Sentinel really nailed this one, connecting everything together. Just goes to show that trying something different can take you somewhere unexpected. You never know what’s out there, and there are definitely more, newer samples like this. Full report: sentinelone.com/labs/fast16-my…
English
0
22
128
6.8K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Yarden Shafir
Yarden Shafir@yarden_shafir·
I checked and it's been 2 years since my last blog post??? So anyway, here's a quick blog post about KDP pool - the latest KDP feature that will replace the secure pool in future Windows versions: windows-internals.com/goodbye-secure…
Yarden Shafir tweet media
English
7
75
251
18.5K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️ Bitwarden Statement on Checkmarx Supply Chain Incident: "The Bitwarden security team identified and contained a malicious package that was briefly distributed through the npm delivery path for @bitwarden/cli@2026.4.0 between 5:57 PM and 7:30 PM (ET) on April 22, 2026, in connection with a broader Checkmarx supply chain incident. The investigation found no evidence that end user vault data was accessed or at risk, or that production data or production systems were compromised. Once the issue was detected, compromised access was revoked, the malicious npm release was deprecated, and remediation steps were initiated immediately. The issue affected the npm distribution mechanism for the CLI during that limited window, not the integrity of the legitimate Bitwarden CLI codebase or stored vault data. Users who did not download the package from npm during that window were not affected. Bitwarden has completed a review of internal environments, release paths, and related systems, and no additional impacted products or environments have been identified at this time. A CVE for Bitwarden CLI version 2026.4.0 is being issued in connection with this incident." community.bitwarden.com/t/bitwarden-st…
English
1
7
41
4.7K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
John Hultquist
John Hultquist@JohnHultquist·
Threat actors are using AI to enhance the scale, speed, and sophistication of their operations in a number of ways, but vulnerability discovery and exploitation may be the most disruptive, serious implication for defenders. A deluge of zerodays and n-days is probably coming. 1/x
English
8
13
57
10.9K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
sapir federovsky
sapir federovsky@sapirxfed·
I’ve been meaning to watch this talk for ages, and wow! 🤩 @fabian_bader managed to explain such a complex topic so clearly. I finally feel like I actually get Passkeys now! !🙌 youtube.com/watch?v=DQ4dnX… Highly recommend giving this a watch
YouTube video
YouTube
sapir federovsky tweet media
English
3
18
88
6.7K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Heather Adkins - Ꜻ - Spes consilium non est
An update from NIST. Due to volume they’re only going to enrich CVEs that are meaningful to USG federal systems and critical software (some more nuance in the blog post). This means if you’re relying on the NVD data for your enterprise security program and use other software, your tools may not flag software you use as at risk. nist.gov/news-events/ne…
English
5
112
293
45.2K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
James Northey
James Northey@darkrym11·
Found some very common adware quietly killing antivirus products. Then we found an unregistered update domain, and anyone with $10 could have pushed any payload to 25,000+ endpoints, AV already disabled. So we registered it first. huntress.com/blog/pups-grow… Big thanks to @_rdowd
English
3
56
234
56.4K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Anton
Anton@Antonlovesdnb·
#AIForBlueTeam - Day 27! Today I'm dropping a new tool 🔧 fishbowl is a containerized credential auditing perimeter for AI coding agents. It wraps Codex/Claude Code in Docker and audits credential access via eBPF. Check out the git repo ( link below ) for more information and log samples.
Anton tweet media
English
2
13
34
2.9K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Aziz Farghly ⚡
Aziz Farghly ⚡@FarghlyMal·
new YARA rule in signature-base for BlueHammer — a Windows LPE PoC that uses Defender itself to dump SAM. short thread on how it works and what the rule keys on the thread🧵 github.com/Neo23x0/signat…
English
1
10
33
3.7K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
John Hammond
John Hammond@_JohnHammond·
robots take over the world or something i guess idk x.com/i/broadcasts/1…
English
2
6
42
3.7K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Rob T. Lee
Rob T. Lee@robtlee·
Registration is OPEN for Find Evil! the first hackathon for autonomous AI incident response. Built by the community, for the community. $22K+ in prizes. Mission: Make Protocol SIFT, the framework connecting AI agents to the SIFT Workstation's full toolset, into a fully autonomous incident response agent. SIFT Workstation is a beat to shreds, open-source incident response platform with 200+ tools. 19 years of community development. 60K+ downloads annually. No incident response background required. New to AI? Good. Get your hands on the tools and learn with us. Registration open April 1. Hackathon starts April 15. Submissions due June 15. Register: findevil.devpost.com Read more: robtlee73.substack.com/p/registration… Sponsored by @SANSInstitute
Rob T. Lee tweet media
English
3
49
120
23.7K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Aaron Jornet
Aaron Jornet@RexorVc0·
🚨 Big news: New TH Book 🏹 After years in Threat Hunting, I wrote the book I always wanted when I started. The Art of Threat Hunting, practical, technical, no fluff. ⚡Hypothesis generation, queries & adaptation stuff, CTI-driven programs, documentation, team alignment. The full lifecycle. 🦖Full breakdown on the blog: rexorvc0.com 🔗Available on Amazon: amazon.com/Art-Threat-Hun… #ThreatHunting #BlueTeam #Cybersecurity #Research #CTI #Malware #threat
Aaron Jornet tweet media
English
11
71
332
18.7K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
Austin Larsen
Austin Larsen@AustinLarsen_·
⚠️ Our team at Google is releasing more details on the recent NPM #axios supply chain attack. Notably, we now attribute this activity to #UNC1069, a financially motivated North Korean 🇰🇵 nexus threat actor active since at least 2018.
English
35
193
1.4K
185.7K
Kyle - chaoticflaws.bsky.social 🇺🇦 retweetet
John Hultquist
John Hultquist@JohnHultquist·
We are still looking at the axios supply chain compromise, but we’ve attributed it to UNC1069, a suspected DPRK actor, who we covered in a blog this February. They are financially-motivated and historically DPRK uses these incidents to target crypto. cloud.google.com/blog/topics/th…
English
9
124
337
36.7K