Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ

11.2K posts

Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ banner
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ

Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ

@chaoticflaws

I'm a forensicating addict, President of MISEC Nonprofit, MiseCon/Converge/BSides Detroit Organizer, CSO Antigen Security #MISEC #DFIR https://t.co/cPof2JggDD

๊ฐ€์ž…์ผ Nisan 2014
1.4K ํŒ”๋กœ์ž‰975 ํŒ”๋กœ์›Œ
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157ยท
claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.mdfile that primes Claude with expert-level methodology for a specific attack surface from SQLi to shellcode, EDR evasion to exploit development. Resource: github.com/SnailSploit/Clโ€ฆ
7h3h4ckv157 tweet media
English
4
113
814
44.7K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Tom Dรถrr
Tom Dรถrr@tom_doerrยท
Ethical open-source intelligence graph exploration tool github.com/reconurge/flowโ€ฆ
Tom Dรถrr tweet media
English
5
133
896
36.8K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Kostas
Kostas@Kostastsaleยท
This is one of the more fascinating malware write-ups I've read in a while. Sentinel LABS covered fast16, a 2005 sabotage framework that was doing things most people associate with much later operations. The malware used a driver to tamper with calculation software, but it also had automated methods to propagate through the network. It looked for the right applications, used Windows-native mechanisms, and took advantage of shared drives with weak passwords or no passwords. This is a good takeaway because the sabotage only works well if the corrupted results become consistent across systems, so if one workstation gives bad results, someone may spot it. Having the testing and validation documents in the same flat network makes tampering easier. Also, the mechanisms used to tamper with research are fascinating. A chain of operations starting from a filesystem driver, and very specific software targeting. Sentinel really nailed this one, connecting everything together. Just goes to show that trying something different can take you somewhere unexpected. You never know whatโ€™s out there, and there are definitely more, newer samples like this. Full report: sentinelone.com/labs/fast16-myโ€ฆ
English
0
22
128
6.8K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Yarden Shafir
Yarden Shafir@yarden_shafirยท
I checked and it's been 2 years since my last blog post??? So anyway, here's a quick blog post about KDP pool - the latest KDP feature that will replace the secure pool in future Windows versions: windows-internals.com/goodbye-secureโ€ฆ
Yarden Shafir tweet media
English
7
75
251
18.5K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Dark Web Informer
Dark Web Informer@DarkWebInformerยท
โ€ผ๏ธ Bitwarden Statement on Checkmarx Supply Chain Incident: "The Bitwarden security team identified and contained a malicious package that was briefly distributed through the npm delivery path for @bitwarden/cli@2026.4.0 between 5:57 PM and 7:30 PM (ET) on April 22, 2026, in connection with a broader Checkmarx supply chain incident. The investigation found no evidence that end user vault data was accessed or at risk, or that production data or production systems were compromised. Once the issue was detected, compromised access was revoked, the malicious npm release was deprecated, and remediation steps were initiated immediately. The issue affected the npm distribution mechanism for the CLI during that limited window, not the integrity of the legitimate Bitwarden CLI codebase or stored vault data. Users who did not download the package from npm during that window were not affected. Bitwarden has completed a review of internal environments, release paths, and related systems, and no additional impacted products or environments have been identified at this time. A CVE for Bitwarden CLI version 2026.4.0 is being issued in connection with this incident." community.bitwarden.com/t/bitwarden-stโ€ฆ
English
1
7
41
4.7K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Aaron Jornet
Aaron Jornet@RexorVc0ยท
#APT #APT44 #Sandworm #VoodooBear #SSH #TOR #threat #malware ๐Ÿ“๐Ÿ‡ท๐Ÿ‡บ ๐Ÿ’ฅ๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ช๐Ÿ‡บ๐ŸŒ โ›“๏ธ #Phishing > ZIP > #LNK (PDF decoy) > PS exec > Download next stage > Execute payloads (EXEs) > Persistence > Self-delete > SSH config + TOR > #C2 communication > Remote control ๐Ÿ”—360 Threat intel: mp.weixin.qq.com/s?__biz=MzUyMjโ€ฆ
Aaron Jornet tweet media
English
3
25
64
5.8K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
John Hultquist
John Hultquist@JohnHultquistยท
Threat actors are using AI to enhance the scale, speed, and sophistication of their operations in a number of ways, but vulnerability discovery and exploitation may be the most disruptive, serious implication for defenders. A deluge of zerodays and n-days is probably coming. 1/x
English
8
13
57
10.9K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
sapir federovsky
sapir federovsky@sapirxfedยท
Iโ€™ve been meaning to watch this talk for ages, and wow! ๐Ÿคฉ @fabian_bader managed to explain such a complex topic so clearly. I finally feel like I actually get Passkeys now! !๐Ÿ™Œ youtube.com/watch?v=DQ4dnXโ€ฆ Highly recommend giving this a watch
YouTube video
YouTube
sapir federovsky tweet media
English
3
18
88
6.7K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Heather Adkins - ๊œบ - Spes consilium non est
An update from NIST. Due to volume theyโ€™re only going to enrich CVEs that are meaningful to USG federal systems and critical software (some more nuance in the blog post). This means if youโ€™re relying on the NVD data for your enterprise security program and use other software, your tools may not flag software you use as at risk. nist.gov/news-events/neโ€ฆ
English
5
112
293
45.2K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
James Northey
James Northey@darkrym11ยท
Found some very common adware quietly killing antivirus products. Then we found an unregistered update domain, and anyone with $10 could have pushed any payload to 25,000+ endpoints, AV already disabled. So we registered it first. huntress.com/blog/pups-growโ€ฆ Big thanks to @_rdowd
English
3
56
234
56.4K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Anton
Anton@Antonlovesdnbยท
#AIForBlueTeam - Day 27! Today I'm dropping a new tool ๐Ÿ”ง fishbowl is a containerized credential auditing perimeter for AI coding agents. It wraps Codex/Claude Code in Docker and audits credential access via eBPF. Check out the git repo ( link below ) for more information and log samples.
Anton tweet media
English
2
13
34
2.9K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Aziz Farghly โšก
Aziz Farghly โšก@FarghlyMalยท
new YARA rule in signature-base for BlueHammer โ€” a Windows LPE PoC that uses Defender itself to dump SAM. short thread on how it works and what the rule keys on the thread๐Ÿงต github.com/Neo23x0/signatโ€ฆ
English
1
10
33
3.7K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
John Hammond
John Hammond@_JohnHammondยท
robots take over the world or something i guess idk x.com/i/broadcasts/1โ€ฆ
English
2
6
42
3.7K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Rob T. Lee
Rob T. Lee@robtleeยท
Registration is OPEN for Find Evil! the first hackathon for autonomous AI incident response. Built by the community, for the community. $22K+ in prizes. Mission: Make Protocol SIFT, the framework connecting AI agents to the SIFT Workstation's full toolset, into a fully autonomous incident response agent. SIFT Workstation is a beat to shreds, open-source incident response platform with 200+ tools. 19 years of community development. 60K+ downloads annually. No incident response background required. New to AI? Good. Get your hands on the tools and learn with us. Registration open April 1. Hackathon starts April 15. Submissions due June 15. Register: findevil.devpost.com Read more: robtlee73.substack.com/p/registrationโ€ฆ Sponsored by @SANSInstitute
Rob T. Lee tweet media
English
3
49
120
23.7K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Aaron Jornet
Aaron Jornet@RexorVc0ยท
๐Ÿšจ Big news: New TH Book ๐Ÿน After years in Threat Hunting, I wrote the book I always wanted when I started. The Art of Threat Hunting, practical, technical, no fluff. โšกHypothesis generation, queries & adaptation stuff, CTI-driven programs, documentation, team alignment. The full lifecycle. ๐Ÿฆ–Full breakdown on the blog: rexorvc0.com ๐Ÿ”—Available on Amazon: amazon.com/Art-Threat-Hunโ€ฆ #ThreatHunting #BlueTeam #Cybersecurity #Research #CTI #Malware #threat
Aaron Jornet tweet media
English
11
71
332
18.7K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
Austin Larsen
Austin Larsen@AustinLarsen_ยท
โš ๏ธ Our team at Google is releasing more details on the recent NPM #axios supply chain attack. Notably, we now attribute this activity to #UNC1069, a financially motivated North Korean ๐Ÿ‡ฐ๐Ÿ‡ต nexus threat actor active since at least 2018.
English
35
193
1.4K
185.7K
Kyle - chaoticflaws.bsky.social ๐Ÿ‡บ๐Ÿ‡ฆ ๋ฆฌํŠธ์œ—ํ•จ
John Hultquist
John Hultquist@JohnHultquistยท
We are still looking at the axios supply chain compromise, but weโ€™ve attributed it to UNC1069, a suspected DPRK actor, who we covered in a blog this February. They are financially-motivated and historically DPRK uses these incidents to target crypto. cloud.google.com/blog/topics/thโ€ฆ
English
9
124
337
36.7K