Greg Bailey

3.2K posts

Greg Bailey banner
Greg Bailey

Greg Bailey

@GRBail

Analyst @HuntressLabs | Instructor @SANSInstitute | neo-hippie | grateful dad | all around nice guy

Chicago, IL Katılım Haziran 2011
1.6K Takip Edilen757 Takipçiler
Sabitlenmiş Tweet
Greg Bailey
Greg Bailey@GRBail·
Greg Bailey tweet media
ZXX
0
1
13
0
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
On April 16, 2026, a threat actor used stolen VPN creds to pivot into a Huntress partner Windows workstation and dropped a SYSTEM-level backdoor using the Komari agent - a 4.3k-star, MIT-licensed, Go-based project on GitHub. 👇🧵
English
6
36
224
42K
Greg Bailey retweetledi
Vaishnavi
Vaishnavi@_vmlops·
MICROSOFT OPEN-SOURCED THEIR ENTIRE SENTINEL SECURITY TOOLKIT most teams building on azure figure out threat detection the hard way trial and error, custom KQL, dashboards built from nothing, playbooks written by hand nobody told them it was already done the sentinel github repo has: ▫️ 1000+ pre-built threat detection rules ▫️ hunting queries for active threat investigation ▫️ automated response playbooks ▫️ security workbooks + dashboards ▫️ data connectors for 100s of sources the hard part was already done github.com/Azure/Azure-Se…
English
17
191
937
91.6K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
On May 5, Huntress Threat Intel Analyst Casey Smith and special guest @sherrod_im, GM of Global Threat Intel at @MsftSecIntel, are breaking down what happened, why it worked, and how defenders can fight back. Save your spot for the live event: okt.to/xAEr3a #MSPartner
Huntress tweet media
English
0
4
15
1.8K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
In February 2026, EvilTokens weaponized Railway to stand up token-harvesting infrastructure at machine speed. → AI-generated lures tailored to role and industry → Legit Microsoft auth flows abused by design → Infrastructure running on trusted tooling like AWS and Cloudflare
Huntress tweet media
English
3
10
40
5.6K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
Last week, the Huntress SOC observed Nightmare-Eclipse tooling, including BlueHammer, RedSun, and UnDefend, during a real-world intrusion investigation. @Curity4201 breaks down the details. 🔍 Check out the full write-up: okt.to/uUzJOA
English
3
13
39
5.4K
Greg Bailey retweetledi
James Northey
James Northey@darkrym11·
Got to work on this with the legend @_JohnHammond. A user asked Codex to fix suspicious behaviour on their machine. Codex "solved" it, but the cryptominer kept running. Plus: How Gen-AI noise is complicating investigations and how SOCs need to evolve. huntress.com/blog/codex-par…
English
3
12
43
37.3K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
The Huntress SOC is observing the use of Nightmare-Eclipse's BlueHammer, RedSun, and UnDefend exploitation techniques. Investigation by: @wbmmfq, @Curity4201, + @_JohnHammond 🧵👇
Huntress tweet media
English
11
138
690
139.6K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
RMM abuse surged 277% last year, making up nearly a quarter of the incidents we observed. (Huntress 2026 Cyber Threat Report). Not because people don't care. Because these tools are trusted by default. Attackers noticed. And built a playbook around it. 🧵
English
1
18
54
5.9K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
We investigated a campaign where cybercriminals created fake OpenClaw installers on GitHub that showed up as the top AI search suggestion in Bing. Details below. 🧵
English
5
37
144
15.9K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
There's a dark enterprise out there growing faster than any other business on earth. And it's your hidden competition. On March 18, @_JohnHammond and @JimBrowning11 are exposing how cybercriminal organizations actually operate. Save your spot: okt.to/xagoFA
English
1
8
36
5.7K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
Mohammad Muzahir thought he was taking a legit IT job. Instead, he was trafficked into a scam compound and forced to defraud people under threat of violence. What he shared with us pulls back the curtain on how the system works. ⬇️ okt.to/TbtHfk
English
0
9
21
3.7K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
Coming up on #TradecraftTuesday, we're breaking down AppDomainManager Injection, a technique cybercriminals are using to turn legit .NET binaries into "living-off-the-land" weapons. 👀 Join us live next week to see exactly how it works: okt.to/rhWcDs
Huntress tweet media
English
0
4
17
1.6K
Greg Bailey retweetledi
CISA Cyber
CISA Cyber@CISACyber·
CVE-2025-59287 is being actively exploited. Update Windows Server Update Services now to reduce risk of a threat actor achieving remote code execution with system privileges. See our Alert for details ➡️ go.dhs.gov/in5 #Cybersecurity
English
20
180
453
102.7K
Greg Bailey retweetledi
Huntress
Huntress@HuntressLabs·
⚠️ Threat actors exploiting a recent Microsoft WSUS vulnerability (CVE-2025-59287) - Microsoft released an out-of-band update for the flaw on 10/24 ✅ Apply the update as soon as possible IOCs, examples of adversary tradecraft, and remediations: okt.to/0eJ3zw
Huntress tweet media
English
1
45
145
15.6K
Greg Bailey
Greg Bailey@GRBail·
Wait, did @MLB really put playoff baseball in the middle of the week with a 1PM start?
English
0
0
0
41