Inside the LockBit's Admin Panel Leak: Affiliates, Victims and Millions in Crypto
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
Quarter One Cyber Security Insights 2025 - NCSC NZ
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
‘What F***ing Russia Day?’: Ukrainian Intel Wipes Out Russian Telecom in Massive Cyberattack
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
Call Stacks: No More Free Passes For Malware
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
[2506.02859v1] ATAG: AI-Agent Application Threat Assessment with Attack Graphs
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
Crowhammer: Full Key Recovery Attack on Falcon with a Single Rowhammer Bit Flip
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
The Impact of Artificial Intelligence on the Cybersecurity Workforce
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
GrayAlpha (FIN7) Uses Diverse Infection Vectors to Deploy PowerNet Loader and NetSupport RAT
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
KQL: Defender for Endpoint/Windows Service Masquerading as Per-User Service
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
Hunting Through APIs - "the advantages, limitations, and scopes of the Graph API, Azure Monitor API, and Defender ATP API are discussed"
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
CVE-2025-33053-Proof-Of-Concept: CVE-2025-33053 Proof Of Concept (PoC) - "provides scripts to automatically deploy a WebDAV server on Ubuntu using Apache2, and generate malicious .url shortcut files for use in phishing, red teaming, or lateral movement simulation"
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
North Korean Crypto-Heist Targets Web3 Developers via Malicious NPM Package
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
objc-helper: IDA helper plugin to reverse engineer Objective-C code
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
macOS Tahoe brings a new disk image format
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
APT Stealth Falcon - CVE-2025-33053 KQL Detection
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
Kibana 8.12.1 Security Update (ESA-2024-21) - "Improper authorization in Kibana can lead to privilege abuse via a direct HTTP request to a Synthetic monitor endpoint"
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
New spyware case in Italy confirms worrying trend - Italy: New case of journalist targeted with Graphite spyware confirms widespread use of unlawful surveillance
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
2025-06-12: Iron Taurus remains an active threat
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
CTO at NCSC Summary: week ending June 15th
This subreddit is for technical professionals to discuss cybersecurity news, research, threats, etc.
COMmander: .NET tool used to enrich RPC telemetry - can enrich defensive telemetry around RPC and COM.
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
CTO at NCSC Summary: week ending June 15th
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
Towards Secure MLOps: Surveying Attacks, Mitigation Strategies, and Research Challenges
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
PoCGen: Generating Proof-of-Concept Exploits for Vulnerabilities in Npm Packages
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
Call for views on the cyber security of enterprise connected devices
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.
OneLogin, Many Issues: How I Pivoted from a Trial Tenant to Compromising Customer Signing Keys
We focus on technical intelligence, research and engineering to help operational [blue|purple] teams defend their estates and have awareness of the world.