Securityblog

261.3K posts

Securityblog banner
Securityblog

Securityblog

@Securityblog

There are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer

Naples,Italy Katılım Eylül 2007
13.6K Takip Edilen12.4K Takipçiler
Securityblog retweetledi
Bryson 🦄
Bryson 🦄@brysonbort·
Thread: How real adversaries are using C2 in 2026 (From building @scythe_io + watching nation-state/red team playbooks)  Spoiler: It's not just fancy Cobalt Strike beacons anymore. 🦄 1/10
English
3
26
123
11.7K
Securityblog retweetledi
FBI Cyber Division
FBI Cyber Division@FBICyberDiv·
Iranian cyber actors are using Telegram as command-and-control (C2) infrastructure to push malware targeting Iranian dissidents and opposition groups around the world – resulting in data leaks and reputational harm. Read the #FBI’s new advisory on tactics used by Iranian intelligence and mitigation strategies to reduce the risk of compromise🔗ic3.gov/CSA/2026/26032…
FBI Cyber Division tweet media
English
109
989
1.9K
133.5K
Securityblog retweetledi
OSINT Industries
OSINT Industries@OSINTindustries·
🇲🇽 El Chapo thought burner phones kept him safe. Wiretaps proved otherwise. Today, OSINT would map his entire network before a single call is heard: osint.industries/project/osint-…
English
1
3
13
1.1K
Securityblog retweetledi
Alex. Turing
Alex. Turing@TuringAlex·
🚨The iOS exploit kit #Coruna is a fascinating case. With XLAB #PDNS, its DGA C2s are easily exposed—we grabbed four ourselves. Stats show ~4,400+ infected IPs (or researchers) per day. Surprisingly, 98.5% of these IPs are located in China, why?🤔 Happy hunting 🍷@Xlab_qax
Alex. Turing tweet mediaAlex. Turing tweet mediaAlex. Turing tweet media
English
0
3
9
798
Securityblog retweetledi
Nextron Research ⚡️
Nextron Research ⚡️@nextronresearch·
RegPhantom a signed Windows kernel rootkit that turns the registry into a covert execution channel. Gives the ability to an unprivileged usermode to reflectively load an arbitrary PE into kernel memory, invisible to PsLoadedModuleList and standard driver enumeration tools. The implant includes several stealth techniques: - Post-execution memory wipe - XOR-encoded hook pointers in-memory obfuscation - Valid code-signing certificates - CFG obfuscation with opaque predicates - 28+ samples tracked (June–August 2025), signed with certificates from two Chinese companies. We're releasing: - Full technical writeup - Extensive deobfuscation scripts - YARA detection rule Full analysis: nextron-systems.com/2026/03/20/reg… #MalwareAnalysis #Rootkit #ThreatIntel #DFIR #Windows #KernelDriver
Nextron Research ⚡️ tweet media
English
0
33
88
7K
Securityblog retweetledi
Digital Security Watch
Here's a useful resource for victims of data breaches, including checklists and letter templates: bit.ly/2xFuvUV
Digital Security Watch tweet media
English
0
1
1
75
Securityblog retweetledi
Dan Black
Dan Black@DanWBlack·
Good overview of tactics being used to compromise Signal accounts. Government/military officials, or anyone working at the intersection of Russian security issues (private sector, journalists, civil society orgs writ large) should urgently review. ic3.gov/PSA/2026/PSA26…
Dan Black tweet mediaDan Black tweet media
English
5
60
137
15.6K
Securityblog retweetledi
vx-underground
vx-underground@vxunderground·
Mildly Interesting: Windows Defender 1.445.674.0 contains logic to detect malware designed to target "AIGen" threats. It is titled "AIGen.Trojan.ClawHavoc".
vx-underground tweet mediavx-underground tweet media
English
15
49
757
34.2K
Securityblog retweetledi
Wiz
Wiz@wiz_io·
🚨 Wiz Research: Trivy supply chain attack. Backdoored version + poisoned GitHub Actions exposed secrets and cloud creds. Used it March 19–20? Rotate creds, audit pipelines, pin actions to SHA. wiz.io/blog/trivy-com…
English
0
8
22
1.3K
Securityblog retweetledi
Steven Lim
Steven Lim@0x534c·
Tax hunting season is open… It’s that time of year again—threat actors are exploiting tax season to phish unsuspecting users, leveraging trusted cloud infrastructure to slip past security controls. One recent example uncovered by me via ANY.RUN intelligence lookup: a newly created SharePoint site masquerading as a tax document portal. This domain has been attributed to the FlowerStorm threat actor and, alarmingly, remains undetected across all 94 VirusTotal engines. Fellow defenders, stay vigilant and keep an eye out for this domain.🫡 totaltaxinc-my[.]sharepoint[.]com #Cybersecurity #Phishing #FlowerStorm #TaxSeason
Steven Lim tweet media
English
1
2
16
986
Securityblog retweetledi
Cyber_OSINT
Cyber_OSINT@Cyber_O51NT·
CrowdStrike highlights a supply chain compromise described as a trivy-action attack, illustrating how the compromise unfolded from scanner to stealer in the affected ecosystem. crowdstrike.com/en-us/blog/fro…
English
0
11
53
5.5K