Lubo Nistor

1.4K posts

Lubo Nistor

Lubo Nistor

@secenged

Security stuff maker

Germany Katılım Haziran 2015
105 Takip Edilen40 Takipçiler
Lubo Nistor retweetledi
IT Guy
IT Guy@T3chFalcon·
Automation blueprints for Red Team & Pentest, Blue Team (SOC/DFIR/TI), Application Security (AppSec/DevSecOps), and Platform/General Security — all using n8n. github.com/CyberSecurityU…
IT Guy tweet media
English
10
126
616
29.6K
Lubo Nistor retweetledi
Giuseppe Calì
Giuseppe Calì@_gcali·
If you like VPN exploits as much as us, you're going to love this course Zeroshi is bringing to @_ringzer0! Marco will walk students into opening up edge devices for research, mapping their attack surface, finding vulns and building full exploit chains. ringzer0.training/countermeasure…
English
3
9
58
6.8K
Lubo Nistor retweetledi
FuzzingLabs
FuzzingLabs@FuzzingLabs·
🚀 Open-sourcing MCP Security Hub A growing collection of MCP servers bringing security tools to AI assistants Nmap, Ghidra, Nuclei, SQLMap, Hashcat... and we're just getting started Contribute your favorite tools 🛠️ ⭐ github.com/FuzzingLabs/mc…
English
4
43
252
15.9K
Lubo Nistor retweetledi
blackorbird
blackorbird@blackorbird·
This blog post examines the growing threat of destructive "bricking" attacks on Operational Technology (OT) devices, using the December 29, 2025, coordinated cyber attacks on Poland's electric grid as a case study. Hitachi Energy Relion 650 Series IEDs (protection relays): Exploited default FTP credentials to delete critical files → causing a "soft brick" (device fails to boot properly, loses remote/local access). Similar to a previously disclosed CVE-2024-8036 in ABB equipment (Hitachi acquired ABB's power grids division). Hitachi Energy RTU560: Accessed via default web credentials. Uploaded malicious firmware (bypassing secure update checks in older versions). Resulted in a "hard brick" with an infinite bootloop due to corrupted entry-point code on the ARM-based processor. Mikronika RTUs: Compromised via SSH with default root credentials. Filesystem completely wiped. Moxa NPort 6000 Series (serial-to-IP converters): Default web credentials used to factory reset, change passwords, and set unreachable IPs (disruptive but not fully bricked). midnightblue.nl/blog/have-you-… #sandworm
blackorbird tweet media
blackorbird@blackorbird

In the renewable energy sector, an attack targeted at least 30 wind and solar farms in Poland. The attack resulted in a loss of communication between the facilities and distribution system operators (DSOs), but it did not affect ongo‑ing electricity generation. #IOCs #APT #Wiper CERT Polska Energy Sector Incident Report 2025 github.com/blackorbird/AP… #Sandworm DynoWiper update: Technical analysis and attribution welivesecurity.com/en/eset-resear… dragos 2025 poland attack report github.com/blackorbird/AP…

English
0
11
43
6.8K
Lubo Nistor retweetledi
SpecterOps
SpecterOps@SpecterOps·
WSL2 is a powerful attacker hideout because it runs as a separate Hyper-V VM, and defenders rarely monitor it. Daniel Mayer explains how attackers pivot into WSL2 and what it took to build tooling that works across WSL2 versions. Read more ⤵️ ghst.ly/45fPUma
English
9
173
727
103.8K
Lubo Nistor retweetledi
AISecHub
AISecHub@AISecHub·
Security Detections MCP - github.com/MHaggis/Securi… An MCP (Model Context Protocol) server that lets LLMs query a unified database of Sigma, Splunk ESCU, Elastic, and KQL security detection rules.
English
4
34
137
8.4K
Lubo Nistor retweetledi
n00py
n00py@n00py1·
NTLM reflection attacks can be used to compromise Active Directory domains even with SMB signing if systems aren’t fully patched depthsecurity.com/blog/using-ntl…
English
4
117
372
24K
Lubo Nistor retweetledi
Cobalt Strike
Cobalt Strike@_CobaltStrike·
New Blog: Based on his talk at Black Hat, @0xTriboulet discusses integrating Windows AI/ML APIs into Cobalt Strike’s workflows and presents proof-of-concept implementations for AI-augmented post-exploitation capabilities in Cobalt Strike. ow.ly/8hSO50WWTSW
Cobalt Strike tweet media
English
2
30
63
13.6K
Lubo Nistor retweetledi
OtterHacker
OtterHacker@OtterHacker·
Got access to an AWS infrastructure during your RedTeam and you don't know how to do access persistence other than just adding an AccessKey ? 🫤 Step up your game with new TTPs ! 🫡 From IAM modification to lambda hijacking, 1001 ways to keep access ! riskinsight-wavestone.com/en/2025/09/aws…
English
2
44
203
23.6K
Lubo Nistor retweetledi
Jason Lang
Jason Lang@curi0usJack·
A huge list of interesting Azure Sentinel hunting queries to give you some inspiration for your next purple team. github.com/Azure/Azure-Se…
English
2
36
166
15.6K
Lubo Nistor retweetledi
Olaf Hartong
Olaf Hartong@olafhartong·
In about an hour I’ll present my talk I’m in your logs now, deceiving your analysts and blinding your EDR at #BHUSA25 @BlackHatEvents in Islander E/I. Come and hang out!
Olaf Hartong tweet media
English
5
13
61
3.7K
Lubo Nistor retweetledi
DirectoryRanger
DirectoryRanger@DirectoryRanger·
Slides of the @WEareTROOPERS #TROOPERS25 'AD & Entra ID Security' track have been published. Just click on the individual talks in the agenda. Day 1 #agenda-day--2025-06-25" target="_blank" rel="nofollow noopener">troopers.de/troopers25/age… Day 2 #agenda-day--2025-06-26" target="_blank" rel="nofollow noopener">troopers.de/troopers25/age…
English
0
18
79
8.3K
Lubo Nistor retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 A new Linux backdoor named Plague hid in plain sight for a year—undetected by every antivirus. It hacks PAM to silently hijack SSH logins and wipe all traces. The worst part? No antivirus flagged it. Not one. How it works ↓ thehackernews.com/2025/08/new-pl…
English
9
134
315
33.1K