bsky.app/profile/did:...
I'll be working keep it spam free & good.
If you're curious here are the keywords I'm looking for:
gist.github.com/francisck/d8...
Please provide feedback if you have any.
interseclab.org/wp-content/u...
*EVERY Page is worth reading*
Some interesting tidbits in the thread
interseclab.org/wp-content/u...
*EVERY Page is worth reading*
Some interesting tidbits in the thread
Change your passwords when you can,
Change your passwords when you can,
www.sentinelone.com/labs/ghost-i...
labs.beazley.security/articles/gho...
www.sentinelone.com/labs/ghost-i...
labs.beazley.security/articles/gho...
SonicWall did not explain if the ransomware gangs are using a zero-day
therecord.media/sonicwall-po...
labs.beazley.security/articles/gho...
Thanks for the fantastic collab SentinelLabs team!
labs.beazley.security/articles/gho...
Thanks for the fantastic collab SentinelLabs team!
Here is my team’s advisory on this vulnerability:
labs.beazley.security/advisories/B...
Is your have a publicly exposed SharePoint server, its probably already compromised so get ready to do some IR.
Here is my team’s advisory on this vulnerability:
labs.beazley.security/advisories/B...
Is your have a publicly exposed SharePoint server, its probably already compromised so get ready to do some IR.
1/2
1/2
Other carriers (like T-mobile) have similar programs.
"The Wireless Account Lock, which had been rolling out in waves since earlier this year, is widely accessible for both […]
Other carriers (like T-mobile) have similar programs.
If you don’t have a library card, go get one. Then learn about all the awesome things your local public library has to offer.
If you don’t have a library card, go get one. Then learn about all the awesome things your local public library has to offer.
invariantlabs.ai/blog/mcp-git...
invariantlabs.ai/blog/mcp-git...
My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees.
Here’s what I found and why it matters 👉 wietze.github.io/blog/bypassi...
My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees.
Here’s what I found and why it matters 👉 wietze.github.io/blog/bypassi...
Oh boy...
community.ui.com/releases/Sec...
Oh boy...
community.ui.com/releases/Sec...
We’re on the hunt for volunteer DFIR analysts—with potential for paid opportunities!
You’ll get a set of artifacts and a limited time to show us what you’ve got. 🔎
Follow us on socials—details drop soon!
We’re on the hunt for volunteer DFIR analysts—with potential for paid opportunities!
You’ll get a set of artifacts and a limited time to show us what you’ve got. 🔎
Follow us on socials—details drop soon!
Good write up here:
www.stepsecurity.io/blog/harden-...
The commit that backdoors this is bash that executes something that is base64 encoded which is something that attempts to run a python script to scrape memory on the runner for secrets (see attached image)
🧵 1/2
Good write up here:
www.stepsecurity.io/blog/harden-...
The commit that backdoors this is bash that executes something that is base64 encoded which is something that attempts to run a python script to scrape memory on the runner for secrets (see attached image)
🧵 1/2