security_dumpster

72 posts

security_dumpster banner
security_dumpster

security_dumpster

@securitydumpstr

303: @ https://t.co/I4aYuNOKKY Life long snowboarder and opportunist threat hunter | my views are my own

가입일 Temmuz 2023
337 팔로잉143 팔로워
security_dumpster 리트윗함
Sophos X-Ops
Sophos X-Ops@SophosXOps·
Sophos analysts are investigating a new infection chain for the GOLD BLADE cybercriminal group’s custom RedLoader malware, which initiates command and control (C2) communications.
English
1
7
7
1.5K
security_dumpster 리트윗함
Sophos X-Ops
Sophos X-Ops@SophosXOps·
Sophos MDR has observed 2 distinct social engineering campaigns using a technique referred to as ClickFix spiking during March. Both of these campaigns—one surging on 2 March & the other 12 March—attempted to deploy SecTopRAT malware. We are tracking this activity as STAC6380./1
English
1
8
29
5K
security_dumpster 리트윗함
Sophos X-Ops
Sophos X-Ops@SophosXOps·
In November, Sophos MDR noted a rapid decline in detections for the Rockstar2FA phishing as a service platform. Its rise was documented in a report by Trustwave on November 26. /1 trustwave.com/en-us/resource…
English
2
4
6
937
security_dumpster
security_dumpster@securitydumpstr·
Just put out this research on MiTM PaaS kits Rockstar/ FlowerStorm. While my name is on this, the primary researchers Josh Rawles (@ig3thack3d4u ) and Jordon Olness deserve the lions share of credit. They’re both brilliant to work with and hats off to them news.sophos.com/en-us/2024/12/…
English
0
2
4
178
vx-underground
vx-underground@vxunderground·
Hi, we're on giveaway ??? (???) Our friends at @cyberwarfarelab hooked us up with 5 vouchers for the Certified Multi-Cloud Red Team Analyst If you wanna big brain science and get more stuff for the Holidays, leave a comment below - Winners will be selected randomly in the next 24 hours. - We will DM winners. - If you do not confirm your win in 24 hours a new winner will be selected - If your DMs are closed, you automatically forfeit your prize Have a nice day
English
813
58
539
42K
Greg Lesnewich
Greg Lesnewich@greglesnewich·
Friendly reminder that we have a #100DaysofYARA discord (thanks to @_John_Doyle !) where a lot of folks will be chilling and more responsive than on socials - check it out! And yes red team friends are welcome alongside us blues! 🫶❤️💙💜 discord.gg/z2qFJKez
English
2
5
38
4.8K
security_dumpster
security_dumpster@securitydumpstr·
Me when I saw the theatre showing The Fifth Element on a random Sunday night
GIF
English
0
0
3
154
security_dumpster 리트윗함
Elbridge Colby
Elbridge Colby@ElbridgeColby·
"China’s ‘mind-boggling’ space capabilities worry US, says Space Force chief Beijing’s tech is more concerning than reports of Russian space nukes, said General B. Chance Saltzman." 1/ politico.eu/article/china-…
English
15
47
158
36.9K
security_dumpster 리트윗함
Diego Capriotti
Diego Capriotti@naksyn·
This has been one of my favorites for a while, but now it's time to let it go. Here's my preferred way of getting the KeePass db that we often hunt for: downgrade the executable to version 2.53, use CVE-2023-24055 and wait for the busy admin to trigger the dump of the database. The target can remain clean and you can simply check for the dump creation. KeePass version 2.53 can still open kdbx created with the version 2.57 and if using a proper xml the user will likely notice nothing. Update alerts can also be disabled within the xml. gist.github.com/naksyn/6d5660d…
English
0
49
181
18.5K
security_dumpster 리트윗함
Andy Greenberg (@agreenberg at the other places)
Sophos detailed to me its 5-year cat-and-mouse game with Chinese hackers repeatedly exploiting its firewalls. The company resorted to installing spy "implants" on devices the hackers were testing on—tracing them to a university and contractor in Chengdu. wired.com/story/sophos-c…
English
14
456
1.2K
210.4K
security_dumpster 리트윗함
Andrea P
Andrea P@decoder_it·
OK, I promise to stop spamming about relays with NTLM/Kerberos 😅. But if you're a member of the Distributed COM or Performance Log group, these juicy CLSIDs let you trigger remotely machine authentication of any computer, including DCs, and relay DCOM -> HTTP, SMB… 👇
English
8
74
271
31.9K
security_dumpster 리트윗함
𝓙𝓪𝓬𝓴2
𝓙𝓪𝓬𝓴2@2RunJack2·
🚨 ITW Zero-Day Vulnerability Discovery: #APT37 (#Scarcruft) 🚨 For Responsible Disclosure, we disclose relevant details at this time: Unmasking CVE-2024-38178 The Silent Threat of Windows Scripting Engine 🔗 medium.com/s2wblog/unmask… 🔍 Key findings: - The attack used a freeware advertising module to exploit the vulnerability, marking a shift from previous methods. - The shellcode execution bore striking similarities to tactics from three years ago, underscoring the importance of studying an attacker’s Tactics, Techniques, and Procedures (#TTPs). A few months ago, this issue was shared exclusively with companies in the Joint Analysis Council led by the NCSC, and yesterday, the security advisory was released to the public. Stay informed and vigilant! #APT37 #ThreatHunting #ITW #ZeroDay #TTPs #ThreatIntel #ResponsibleDisclosure
English
1
12
40
3.4K