@cyberresearch.bsky.social
Originally from BHIS: X-Typhon - Not your Father's China with John Strand ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
X-Typhon - Not your Father's China with John Strand
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –
https://poweredbybhis.com
Are you defending against yesterday’s threats while China is preparing for tomorrow’s?
Over the past couple of years, China has upped their game.
With the Salt Typhon and Volt Typhon campaigns, we’ve seen a massive increase in capability and focus in Chinese cyber operations.
Join me (Founder/Owner, Black Hills Information Security) for a free one-hour webcast where I’ll discuss the historical context behind what China is doing right now and how we got here.
Look, I usually hate talking about specific threat actors and what they’re doing.
Defense is a game of consistently applied fundamentals. But this is different.
What China is becoming is far more frightening than what we’ve been dealing with. I seriously doubt most orgs are ready for it because they’ve been so focused on ransomware.
Fair warning: my undergrad degree was in PoliSci, so there will be a fair amount of history and background around the key players.
Chat with your fellow attendees in the Black Hills Infosec Discord server:
https://discord.gg/BHIS
in the #🔴live-chat channel.
www.youtube.com
November 11, 2025 at 1:20 PM
Originally from BHIS: X-Typhon - Not your Father's China with John Strand ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
Originally from Unit 42: You Thought It Was Over? Authentication Coercion Keeps Evolving ( :-{ı▓ #unit42 #threathunting #cyberresearch
You Thought It Was Over? Authentication Coercion Keeps Evolving
A new type of authentication coercion attack exploits an obscure and rarely monitored remote procedure call (RPC) interface.
The post You Thought It Was Over? Authentication Coercion Keeps Evolving appeared first on Unit 42.
unit42.paloaltonetworks.com
November 11, 2025 at 1:06 PM
Originally from Unit 42: You Thought It Was Over? Authentication Coercion Keeps Evolving ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from DataDog: A 2025 look at real-world Kubernetes version adoption ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
A 2025 look at real-world Kubernetes version adoption | Datadog Security Labs
A 2025 look at real-world Kubernetes version adoption
securitylabs.datadoghq.com
November 10, 2025 at 1:08 PM
Originally from DataDog: A 2025 look at real-world Kubernetes version adoption ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
Originally from BHIS: Talkin' Bout [infosec] News 2025-11-10 #infosec #news ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
Talkin' Bout [infosec] News 2025-11-10 #infosec #news
Join us LIVE on Mondays, 4:30pm EST.
A weekly Podcast with BHIS and Friends. (https://blubrry.com/bhis/) We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
Chat with us on Discord! -
https://discord.gg/bhis
🔴live-chat
🔗 Register for FREE webcasts, summits, and workshops -
https://poweredbybhis.com
Brought to you by:
🔗 Black Hills Information Security
https://www.blackhillsinfosec.com/
🔗 Antisyphon Training
https://www.antisyphontraining.com/
#livestream #infosec #news #BHIS #podcast #Cybersecurity #infosecnews
www.youtube.com
November 8, 2025 at 1:29 PM
Originally from BHIS: Talkin' Bout [infosec] News 2025-11-10 #infosec #news ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
Originally from Flare: Attack on Identity: Dissecting the 2025 Microsoft Digital Defense Report ( :-{ı▓ #flare #CTI #cyberresearch
Attack on Identity: Dissecting the 2025 Microsoft Digital Defense Report
Identity-based attacks dominate the cyber threat landscape (and headlines). Is this an entirely new trend, or is only this emphasis on identity-based attacks new? Security researcher and host of Leaky Weekly Nick Ascoli spoke with Mike Iaconianni, Identity Security Expert at Flare, about the 2025 Microsoft Digital Defense Report and their questions about it. In […]
The post Attack on Identity: Dissecting the 2025 Microsoft Digital Defense Report appeared first on Flare | Threat Exposure Management | Cyber Threat Intel.
flare.io
November 7, 2025 at 1:18 PM
Originally from Flare: Attack on Identity: Dissecting the 2025 Microsoft Digital Defense Report ( :-{ı▓ #flare #CTI #cyberresearch
Originally from Red Canary: A defender’s guide to phishing ( :-{ı▓ #threatintel #redcanary #cyberresearch
A defender’s guide to phishing
Experts from Red Canary, MITRE ATT&CK®, and CrowdStrike walk through how to detect and prevent the many varieties of phishing.
redcanary.com
November 7, 2025 at 1:18 PM
Originally from Red Canary: A defender’s guide to phishing ( :-{ı▓ #threatintel #redcanary #cyberresearch
Originally from Unit 42: LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices ( :-{ı▓ #unit42 #threathunting #cyberresearch
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices
Commercial-grade LANDFALL spyware exploits CVE-2025-21042 in Samsung Android’s image processing library. The spyware was embedded in malicious DNG files.
The post LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices appeared first on Unit 42.
unit42.paloaltonetworks.com
November 7, 2025 at 1:18 PM
Originally from Unit 42: LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from TrustedSec: CMMC Subcontractors and Service Providers ( :-{ı▓ #trustedsec #pentesting #cyberresearch
CMMC Subcontractors and Service Providers
Defense contractors are preparing their systems for the start of the upcoming CMMC rollout but what they may not have considered is how their relationship with Subcontractors and External Service Providers (ESPs),…
trustedsec.com
November 6, 2025 at 2:56 PM
Originally from TrustedSec: CMMC Subcontractors and Service Providers ( :-{ı▓ #trustedsec #pentesting #cyberresearch
Originally from BHIS: Abusing Delegation with Impacket (Part 1): Unconstrained Delegation ( :-{ı▓ #BlackHillsInfoSec #Pentesting #cyberresearch
Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
In Active Directory exploitation, Kerberos delegation is easily among my top favorite vectors of abuse, and in the years I’ve been learning Kerberos exploitation, I’ve noticed that Impacket doesn’t get nearly as much coverage as tools like Rubeus or Mimikatz.
The post Abusing Delegation with Impacket (Part 1): Unconstrained Delegation appeared first on Black Hills Information Security, Inc..
www.blackhillsinfosec.com
November 6, 2025 at 1:22 PM
Originally from BHIS: Abusing Delegation with Impacket (Part 1): Unconstrained Delegation ( :-{ı▓ #BlackHillsInfoSec #Pentesting #cyberresearch
Originally from Unit 42: Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management ( :-{ı▓ #unit42 #threathunting #cyberresearch
Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management
Effective cyber defense starts with knowing your own network. Unit 42 explains why asset management is the foundation of threat intelligence.
The post Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management appeared first on Unit 42.
unit42.paloaltonetworks.com
November 6, 2025 at 1:22 PM
Originally from Unit 42: Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from DataDog: MUT-4831: Trojanized npm packages deliver Vidar infostealer malware ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
MUT-4831: Trojanized npm packages deliver Vidar infostealer malware
Analysis of a threat actor campaign targeting Windows users with Vidar infostealer malware via malicious npm packages
securitylabs.datadoghq.com
November 6, 2025 at 1:20 PM
Originally from DataDog: MUT-4831: Trojanized npm packages deliver Vidar infostealer malware ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
Originally from Flare: Flare Secures $30 Million to Accelerate Growth, Innovation, and Strategic Acquisitions ( :-{ı▓ #flare #CTI #cyberresearch
Flare Secures $30 Million to Accelerate Growth, Innovation, and Strategic Acquisitions
Today, we announced our Series B extension of $15 million, led by Inovia Capital’s Growth Fund, with participation from existing investors Base10 Partners and White Star Capital. It also includes $15 million in debt financing from BMO. This brings Flare’s total funding to $60 million over the past year. We’re proud to have seen triple-digit […]
The post Flare Secures $30 Million to Accelerate Growth, Innovation, and Strategic Acquisitions appeared first on Flare | Threat Exposure Management | Cyber Threat Intel.
flare.io
November 5, 2025 at 1:25 PM
Originally from Flare: Flare Secures $30 Million to Accelerate Growth, Innovation, and Strategic Acquisitions ( :-{ı▓ #flare #CTI #cyberresearch
Originally from ProjectDiscovery: Introducing Credential Monitoring ( :-{ı▓ #projectdiscovey #bugbounty #cyberresearch
Introducing Credential Monitoring
Imagine discovering that your company's login credentials are sitting in plain sight on the internet, accessible to anyone who knows where to look. Unfortunately, this isn't hypothetical – it's happening right now to organizations worldwide through malware-stolen credentials.
The Hidden Threat: Malware-Stolen Credentials
Every day, cybercriminals deploy malicious software that quietly steals passwords from infected computers. These "stealer" programs harvest credentials from browsers and appl
projectdiscovery.io
November 4, 2025 at 5:37 PM
Originally from ProjectDiscovery: Introducing Credential Monitoring ( :-{ı▓ #projectdiscovey #bugbounty #cyberresearch
Originally from MS Threat Intel: SesameOp: Novel backdoor uses OpenAI Assistants API for command and control ( :-{ı▓ #CTI #cybersecurity #cyberresearch
SesameOp: Novel backdoor uses OpenAI Assistants API for command and control
Microsoft Incident Response – Detection and Response Team (DART) researchers uncovered a new backdoor that is notable for its novel use of the OpenAI Assistants Application Programming Interface (API) as a mechanism for command-and-control (C2) communications. Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised environment. To do this, a component of the backdoor uses the OpenAI Assistants API as a storage or relay mechanism to fetch commands and run tasks for the threat actor.
The post SesameOp: Novel backdoor uses OpenAI Assistants API for command and control appeared first on Microsoft Security Blog.
www.microsoft.com
November 4, 2025 at 3:28 PM
Originally from MS Threat Intel: SesameOp: Novel backdoor uses OpenAI Assistants API for command and control ( :-{ı▓ #CTI #cybersecurity #cyberresearch
Originally from Flare: The Cybercrime Assembly Line in 2025: Everything as a Service, Telegram, and AI ( :-{ı▓ #flare #CTI #cyberresearch
The Cybercrime Assembly Line in 2025: Everything as a Service, Telegram, and AI
If cybercrime were a country, it would be the world’s third-largest economy, and by the end of this year, cybercrime will have cost the global economy $10.5 trillion. The amount of money lost to cybercrime has been steadily (and rapidly) increasing for years. In 2018, the Center for Strategic and International Studies projected that cybercrime […]
The post The Cybercrime Assembly Line in 2025: Everything as a Service, Telegram, and AI appeared first on Flare | Threat Exposure Management | Cyber Threat Intel.
flare.io
November 4, 2025 at 1:28 PM
Originally from Flare: The Cybercrime Assembly Line in 2025: Everything as a Service, Telegram, and AI ( :-{ı▓ #flare #CTI #cyberresearch
Originally from Red Canary: Red Canary CFP tracker: November 2025 ( :-{ı▓ #threatintel #redcanary #cyberresearch
Red Canary CFP tracker: November 2025
Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines
redcanary.com
November 4, 2025 at 1:28 PM
Originally from Red Canary: Red Canary CFP tracker: November 2025 ( :-{ı▓ #threatintel #redcanary #cyberresearch
Originally from From BHIS: Talkin' Bout [infosec] News 2025-11-03 #infosec #news ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
Talkin' Bout [infosec] News 2025-11-03 #infosec #news
Join us LIVE on Mondays, 4:30pm EST.
A weekly Podcast with BHIS and Friends. (https://blubrry.com/bhis/) We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
Chat with us on Discord! -
https://discord.gg/bhis
🔴live-chat
🔗 Register for FREE webcasts, summits, and workshops -
https://poweredbybhis.com
Brought to you by:
🔗 Black Hills Information Security
https://www.blackhillsinfosec.com/
🔗 Antisyphon Training
https://www.antisyphontraining.com/
#livestream #infosec #news #BHIS #podcast #Cybersecurity #infosecnews
www.youtube.com
November 1, 2025 at 1:50 PM
Originally from From BHIS: Talkin' Bout [infosec] News 2025-11-03 #infosec #news ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
Originally from Red Canary: Unmasking risks that haunt your supply chain ( :-{ı▓ #threatintel #redcanary #cyberresearch
Unmasking risks that haunt your supply chain
A spooky guide to supply chain vulnerabilities with advice on how to scare off adversaries from your system
redcanary.com
November 1, 2025 at 1:36 PM
Originally from Red Canary: Unmasking risks that haunt your supply chain ( :-{ı▓ #threatintel #redcanary #cyberresearch
Originally from DataDog: Datadog threat roundup: Top insights for Q3 2025 ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
Datadog threat roundup: Top insights for Q3 2025
Threat insights from Datadog Security Labs for Q3 2025.
securitylabs.datadoghq.com
November 1, 2025 at 1:35 PM
Originally from DataDog: Datadog threat roundup: Top insights for Q3 2025 ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
Originally from ProjectDiscovery: Hacktober 2025 - Nuclei Templates ( :-{ı▓ #projectdiscovey #bugbounty #cyberresearch
Hacktober 2025 - Nuclei Templates
Summary of Releases v10.3.0 & v10.3.1
This month, we had two major releases of Nuclei Templates, introducing numerous improvements and new templates for Nuclei users.
🚀 Hacktober Stats
Release
New Templates Added
CVEs Added
First-time Contributors
Bounties Awarded
v10.3.0
124
90
6
12
v10.3.1
119
88
10
12
Total
243
178
16
24
Introduction
October was huge for Nuclei Templates, two releases (v10.3.0 & v10.3.1) dropped during Hacktoberfest, adding coverage for 44 actively expl
projectdiscovery.io
October 31, 2025 at 5:49 PM
Originally from ProjectDiscovery: Hacktober 2025 - Nuclei Templates ( :-{ı▓ #projectdiscovey #bugbounty #cyberresearch
Originally from From BHIS: NetExec 3 Building Blocks #cybersecurity #infosec #netexec #exploits ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
NetExec 3 Building Blocks #cybersecurity #infosec #netexec #exploits
/// 🔗 Register for webcasts, summits, and workshops -
https://poweredbybhis.com
///Black Hills Infosec Socials
Twitter: https://twitter.com/BHinfoSecurity
Mastodon: https://infosec.exchange/@blackhillsinfosec
LinkedIn: https://www.linkedin.com/company/antisyphon-training
Discord: https://discord.gg/ffzdt3WUDe
///Black Hills Infosec Shirts & Hoodies
https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections
///Black Hills Infosec Services
Active SOC: https://www.blackhillsinfosec.com/services/active-soc/
Penetration Testing: https://www.blackhillsinfosec.com/services/
Incident Response: https://www.blackhillsinfosec.com/services/incident-response/
///Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: https://www.backdoorsandbreaches.com/
Play B&B Online: https://play.backdoorsandbreaches.com/
///Antisyphon Training
Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/
Live Training: https://www.antisyphontraining.com/course-catalog/
On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/
Antisyphon Discord: https://discord.gg/antisyphon
Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training
///Educational Infosec Content
Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/
Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest
Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining
Active Countermeasures YouTube: https://youtube.com/activecountermeasures
Threat Hunter Community Discord: https://discord.gg/threathunter
Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/
www.youtube.com
October 31, 2025 at 1:53 PM
Originally from From BHIS: NetExec 3 Building Blocks #cybersecurity #infosec #netexec #exploits ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
Originally from Unit 42: When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems ( :-{ı▓ #unit42 #threathunting #cyberresearch
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
Agent session smuggling is a novel technique where AI agent-to-agent communication is misused. We demonstrate two proof of concept examples.
The post When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems appeared first on Unit 42.
unit42.paloaltonetworks.com
October 31, 2025 at 1:39 PM
Originally from Unit 42: When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems ( :-{ı▓ #unit42 #threathunting #cyberresearch
Originally from Red Canary: Here’s what you missed on Office Hours: October 2025 ( :-{ı▓ #threatintel #redcanary #cyberresearch
Here’s what you missed on Office Hours: October 2025
AI agents, threat hunting 101, supply chain scaries, and more: Catch up on the last month's episodes of Red Canary Office Hours.
redcanary.com
October 31, 2025 at 1:39 PM
Originally from Red Canary: Here’s what you missed on Office Hours: October 2025 ( :-{ı▓ #threatintel #redcanary #cyberresearch