Tom Moore retweetledi
Tom Moore
9.8K posts

Tom Moore
@c0ncealed
Whitehat infosec apprentice... Red team menace... Christian, Husband, Father & unrelenting geek!🧐
Katılım Ekim 2011
3.4K Takip Edilen3.7K Takipçiler
Tom Moore retweetledi

🔥 OpenAI launched GPT-5.4-Cyber, a model built for security teams to find and fix bugs faster.
3,000+ vulnerabilities already fixed using its Codex Security tools, with access expanding to thousands of defenders.
But the same AI can be misused to find exploits.
🔗 Read → thehackernews.com/2026/04/openai…

English
Tom Moore retweetledi
Tom Moore retweetledi

🔥 Q1 recap of iPurple.team articles:
EDR Silencing → AppLocker Rules Abuse → GAC Hijacking → Credential Guard → Toast Notifications.
All articles + detection notes in one place ⤵️
1⃣ ipurple.team/2026/01/12/edr…
2⃣ ipurple.team/2026/02/02/app…
3⃣ ipurple.team/2026/02/10/gac…
4⃣ ipurple.team/2026/03/17/cre…
5⃣ ipurple.team/2026/03/25/toa…
English

Great work and congratulations on another amazing conference @BsidesCLT team!
Looking forward to next year!




English
Tom Moore retweetledi

Medical device maker Stryker says it has no timeline for full recovery after a cyberattack by an Iran-linked group disrupted 200K-plus systems. The impact now extends beyond IT to manufacturing, supply chains and hospitals. #cybersecurity #infosec #CISO
bit.ly/4s4iyzW
English

Thank you to each of the volunteers that put on @BsidesCLT this year!
Great venue, talks, and conversations, and it's great to see the conference still bringing people together to learn from one another in the security industry.
English
Tom Moore retweetledi

I think most pentesters have used the classic OWA time-based user enum at some point. Or time-based enum in Lync.
What if I told you that time-based user enum lives on in Azure? And it's tied to Basic Auth.
Basic Auth is dead. Long live Basic Auth!
trustedsec.com/blog/kicking-i…
English
Tom Moore retweetledi

CVE-2020-27786 Linux kernel exploit
covering msg_msg + timerfd_ctx + tty_struct and finishing with ROP.
ii4gsp.github.io/cve-2020-27786/
English
Tom Moore retweetledi
Tom Moore retweetledi

🚨 Alert - Popular #Android apps like Xiaomi File Manager and WPS Office are vulnerable to a path traversal flaw that could let hackers overwrite files and execute malicious code, leaving over 1.5 billion users exposed.
Details here: thehackernews.com/2024/05/popula…
#infosecurity
English
Tom Moore retweetledi

Did you know we will have an electronic badge at the con this year? Our hardware village will give you the chance to build and hack your badge. Newbies always welcome! Join the Discord for more info discord.gg/KFnuZyGw
What will you do with your badge?
English
Tom Moore retweetledi
Tom Moore retweetledi

Dropping a new initial access technique via RDP that I dubbed "Rogue RDP". Use malicious .RDP files to bypass email/servers/security gateways and then run code to binary plant/exfil from your own RDP server, blinding EDR. Bonus: Target runs HyperV? RCE! blackhillsinfosec.com/rogue-rdp-revi…
English
Tom Moore retweetledi

Top 16 Active Directory vulnerabilities found during pentests (detailed post)
#infosec #pentest #pentesting #hack #hacking @DirectoryRanger
infosecmatter.com/top-16-active-…
English
Tom Moore retweetledi

It’s not a Tetris piece preview, it’s our 2024 badge preview. Pre-register today to be sure you get one of our electronic badges to hack. events.eventzilla.net/e/cackalackyco…

English
Tom Moore retweetledi

The most sophisticated exploit we've ever seen.
Thank you to @wdormann for bringing this to our attention. This is basically Stuxnet. 2.0

English
Tom Moore retweetledi

Is this in a lab, yes. Is this also what operators would run not in a lab, also yes. Everything in memory, done with off-the-shelf malware with a Rigging integration from run in an "agentic" loop. Sometimes the models do well, sometimes they do poorly, but progress is up and to the right...and the data we get is 🔥
For defenders, it does you no good to see an AI thing and immediately say "that's not possible". It's exactly what Proofpoint said when we reported Proofpudding...It's just here now.
GPUs are about speed and scale, that's what you'll get with AI driven ops, speed and scale. It doesn't undo all the defenses built up in networks.

English
Tom Moore retweetledi

Updated the Persistence checklist. There are 4⃣0⃣ persistence techniques which are backed up with an article ⤵️ github.com/netbiosX/Check… #redteam
English





