Markus
banner
markuslam.bsky.social
Markus
@markuslam.bsky.social
Living @GrimNorth
Working with ICT Security
CVE has been rejected by NIST. nvd.nist.gov/vuln/detail/...
November 11, 2025 at 6:54 AM
So, the republican health care plan is to ban all health care insurances?
All it took was a government shutdown to get Trump to move closer to a single payer universal health care system.
November 8, 2025 at 4:27 PM
Close, but no banana...
Medical emergency in the White House as someone collapses
November 6, 2025 at 6:29 PM
She probably is seeing the writing on the wall and is clearly trying to court votes from the moderate wing of gop. Only time will tell how well she succeeds. Personally, if the vote is between her and a door nail, the door nail gets my vote.
Marjorie Taylor Greene: "Bailing our Argentina and blaming our cattle ranchers is not the way to go."
November 6, 2025 at 4:10 PM
Is this lunatic suggesting rigging elections 🤔
Trump: "They're gonna make DC a state and they're gonna make Puerto Rico a state. So now they pick up two states, four senators. They're gonna pick up electoral votes. It's gonna be a very, very bad situation. Now, if we do what I'm saying, they'll most likely never obtain power."
November 5, 2025 at 2:01 PM
Reposted by Markus
Hackers Compromise Active Directory to Steal NTDS.dit Exfiltration that Leads to Full Domain Compromise
Hackers Compromise Active Directory to Steal NTDS.dit Exfiltration that Leads to Full Domain Compromise
Active Directory (AD) remains the foundation of authentication and authorization in Windows environments. Threat actors targeting the NTDS.dit database can harvest every domain credential, unlock lateral movement, and achieve full domain compromise.  Attackers leveraged native Windows utilities to dump and exfiltrate NTDS.dit, bypassing standard defenses.  The adversary in this case obtained DOMAIN ADMIN privileges via a successful phishing campaign and subsequent privilege escalation . Once elevated, they executed: To create a Volume Shadow Copy and extract NTDS.dit, silently bypassing file locks. With the SYSTEM hive obtained, attackers decrypted the database offline using secretsdump.py from Impacket: This chain enabled harvesting of NTLM and AES hashes for all domain accounts without triggering traditional endpoint alarms. Full Kill Chain After archiving and compressing the dump with tar -czf ntds.tar.gz c:\temp\ntds.dit c:\temp\SYSTEM, the attackers exfiltrated data over SMB to a compromised file share. NTDS.dit file dump Trellix detected this activity via two high-fidelity signatures: anomalous SMB write patterns exceeding baseline volume and a custom exfiltration signature for large NTDS file transfers.  Behavioral detection flagged unexpected esentutl processes running outside maintenance windows, and protocol anomaly alerts triggered on shadow copy reads to C:\$VolumeShadowCopy. Through Trellix Wise, AI-driven alert correlation highlighted the progression from VSS creation to SMB upload, reducing analyst workload by 60% and cutting mean time to detect (MTTD) by 45%.  The theft of NTDS.dit poses an existential threat to Windows domains, providing attackers complete control over all credentials.    NTDS.dit archived for exfiltration Traditional defenses often miss the low-and-slow techniques employed during shadow copy creation and offline decryption. Follow us on Google News , LinkedIn , and X for daily cybersecurity updates. Contact us to feature your stories. The post Hackers Compromise Active Directory to Steal NTDS.dit Exfiltration that Leads to Full Domain Compromise appeared first on Cyber Security News .
cybersecuritynews.com
September 26, 2025 at 10:21 AM
Reposted by Markus
Volvo North America disclosed a data breach following a ransomware attack on IT provider Miljödata
Volvo North America disclosed a data breach following a ransomware attack on IT provider Miljödata
Volvo NA disclosed a data breach that exposed the personal data of its employees after a ransomware attack hit third-party supplier Miljödata.
securityaffairs.com
September 25, 2025 at 5:21 PM
Reposted by Markus
CVE-2025-10184: Unpatched OnePlus Flaw Exposes SMS Data & Breaks MFA, PoC Available
CVE-2025-10184: Unpatched OnePlus Flaw Exposes SMS Data & Breaks MFA, PoC Available
A critical, unpatched OnePlus flaw (CVE-2025-10184) allows any app to read SMS data without permission, breaking MFA protections. PoC is available.
securityonline.info
September 24, 2025 at 5:24 AM
Reposted by Markus
Microsoft Entra ID flaw allowed hijacking any company's tenant
Microsoft Entra ID flaw allowed hijacking any company's tenant
A critical combination of legacy components could have allowed complete access to the Microsoft Entra ID tenant of every company in the world.
www.bleepingcomputer.com
September 21, 2025 at 5:38 PM
Reposted by Markus
CVE-2025-9242: Critical WatchGuard Flaw Allows Remote Code Execution
CVE-2025-9242: Critical WatchGuard Flaw Allows Remote Code Execution
A critical vulnerability (CVE-2025-9242) in WatchGuard's Fireware OS could allow an unauthenticated remote attacker to execute arbitrary code.
securityonline.info
September 17, 2025 at 11:07 AM
Reposted by Markus
Microsoft blocks bait for ‘fastest-growing’ 365 phish kit, seizes 338 domains
Microsoft, Cloudflare shut down RaccoonO365 phishing domains
: Redmond names alleged ringleader, claims 5K+ creds stolen and $100k pocketed
www.theregister.com
September 16, 2025 at 10:04 PM
Alexa, give me things that did not happen for $100
Pete Hegseth claims officials from other countries have thanked him "privately" for blowing up a boat and killing 11 people without any due process
September 10, 2025 at 2:24 PM
This has to be THE most embaracing things, by a mile, a US president has done. I'm flabbergasted that this doesn't end his career as a public person.
September 9, 2025 at 7:48 PM
Reposted by Markus
GOP Cries Censorship Over Spam Filters That Work
GOP Cries Censorship Over Spam Filters That Work – Krebs on Security
The chairman of the Federal Trade Commission (FTC) last week sent a letter to Google’s CEO demanding to know why Gmail was blocking messages from Republican senders while allegedly failing to block similar missives supporting Democrats. The letter followed media reports accusing Gmail of disproportionately flagging messages from the GOP fundraising platform WinRed and sending them to the spam folder. But according to experts who track daily spam volumes worldwide, WinRed’s messages are getting blocked more because its methods of blasting email are increasingly way more spammy than that of ActBlue , the fundraising platform for Democrats. Image: nypost.com On Aug. 13, The New York Post ran an “exclusive” story titled, “Google caught flagging GOP fundraiser emails as ‘suspicious’ — sending them directly to spam.” The story cited a memo from Targeted Victory – whose clients include the National Republican Senatorial Committee (NRSC), Rep. Steve Scalise and Sen. Marsha Blackburn – which said it observed that the “serious and troubling” trend was still going on as recently as June and July of this year. “If Gmail is allowed to quietly suppress WinRed links while giving ActBlue a free pass, it will continue to tilt the playing field in ways that voters never see, but campaigns will feel every single day,” the memo reportedly said. In an August 28 letter to Google CEO Sundar Pichai , FTC Chairman Andrew Ferguson cited the New York Post story and warned that Gmail’s parent Alphabet may be engaging in unfair or deceptive practices. “Alphabet’s alleged partisan treatment of comparable messages or messengers in Gmail to achieve political objectives may violate both of these prohibitions under the FTC Act,” Ferguson wrote. “And the partisan treatment may cause harm to consumers.” However, the situation looks very different when you ask spam experts what’s going on with WinRed’s recent messaging campaigns. Atro Tossavainen and Pekka Jalonen are co-founders at Koli-Lõks OÜ , an email intelligence company in Estonia. Koli-Lõks taps into real-time intelligence about daily spam volumes by monitoring large numbers of “spamtraps” — email addresses that are intentionally set up to catch unsolicited emails. Spamtraps are generally not used for communication or account creation, but instead are created to identify senders exhibiting spammy behavior, such as scraping the Internet for email addresses or buying unmanaged distribution lists. As an email sender, blasting these spamtraps over and over with unsolicited email is the fastest way to ruin your domain’s reputation online. Such activity also virtually ensures that more of your messages are going to start getting listed on spam blocklists that are broadly shared within the global anti-abuse community. Tossavainen told KrebsOnSecurity that WinRed’s emails hit its spamtraps in the .com, .net, and .org space far more frequently than do fundraising emails sent by ActBlue. Koli-Lõks published a graph of the stark disparity in spamtrap activity for WinRed versus ActBlue, showing a nearly fourfold increase in spamtrap hits from WinRed emails in the final week of July 2025. Image: Koliloks.eu “Many of our spamtraps are in repurposed legacy-TLD domains (.com, .org, .net) and therefore could be understood to have been involved with a U.S. entity in their pre-zombie life,” Tossavainen explained in the LinkedIn post. Raymond Dijkxhoorn is the CEO and a founding member of SURBL , a widely-used blocklist that flags domains and IP addresses known to be used in unsolicited messages, phishing and malware distribution. Dijkxhoorn said their spamtrap data mirrors that of Koli-Lõks, and shows that WinRed has consistently been far more aggressive in sending email than ActBlue. Dijkxhoorn said the fact that WinRed’s emails so often end up dinging the organization’s sender reputation is not a content issue but rather a technical one. “On our end we don’t really care if the content is political or trying to sell viagra or penis enlargements,” Dijkxhoorn said. “It’s the mechanics, they should not end up in spamtraps. And that’s the reason the domain reputation is tempered. Not ‘because domain reputation firms have a political agenda.’ We really don’t care about the political situation anywhere. The same as we don’t mind people buying penis enlargements. But when either of those land in spamtraps it will impact sending experience.” The FTC letter to Google’s CEO also referenced a debunked 2022 study (PDF) by political consultants who found Google caught more Republican emails in spam filters. Techdirt editor Mike Masnick notes that while the 2022 study also found that other email providers caught more Democratic emails as spam, “Republicans laser-focused on Gmail because it fit their victimization narrative better.” Masnick said GOP lawmakers then filed both lawsuits and complaints with the Federal Election Commission (both of which failed easily), claiming this was somehow an “in-kind contribution” to Democrats. “This is political posturing designed to keep the White House happy by appearing to ‘do something’ about conservative claims of ‘censorship,'” Masnick wrote of the FTC letter. “The FTC has never policed ‘political bias’ in private companies’ editorial decisions, and for good reason—the First Amendment prohibits exactly this kind of government interference.” WinRed did not respond to a request for comment. The WinRed website says it is an online fundraising platform supported by a united front of the Trump campaign, the Republican National Committee (RNC), the NRSC, and the National Republican Congressional Committee (NRCC). WinRed has recently come under fire for aggressive fundraising via text message as well. In June, 404 Media reported on a lawsuit filed by a family in Utah against the RNC for allegedly bombarding their mobile phones with text messages seeking donations after they’d tried to unsubscribe from the missives dozens of times. One of the family members said they received 27 such messages from 25 numbers, even after sending 20 stop requests. The plaintiffs in that case allege the texts from WinRed and the RNC “knowingly disregard stop requests and purposefully use different phone numbers to make it impossible to block new messages.” Dijkxhoorn said WinRed did inquire recently about why some of its assets had been marked as a risk by SURBL, but he said they appeared to have zero interest in investigating the likely causes he offered in reply. “They only replied with, ‘You are interfering with U.S. elections,'” Dijkxhoorn said, noting that many of SURBL’s spamtrap domains are only publicly listed in the registration records for random domain names. “They’re at best harvested by themselves but more likely [they] just went and bought lists,” he said. “It’s not like ‘Oh Google is filtering this and not the other,’ the reason isn’t the provider. The reason is the fundraising spammers and the lists they send to.”
krebsonsecurity.com
September 7, 2025 at 12:47 AM
This story is effing WILD!
September 5, 2025 at 2:39 PM
Translated: "It's a huge priority for us to commit mortgage fraud". It's always about projection for these guys.
"Mortgage fraud is a huge priority of ours" -- Trump official William Pulte
September 2, 2025 at 2:12 PM
Reposted by Markus
Watch what Don Jr does with his left hand.

This needs to be streaming inside the Capitol, Senate chamber, House chamber, and hologrammed across the White House and Department of Homeland Security.
September 1, 2025 at 4:04 AM
Reposted by Markus
NVIDIA Refuses to Pay 15% China Revenue Share Without a Law
NVIDIA Refuses to Pay 15% China Revenue Share Without a Law
NVIDIA's CFO has stated the company will not pay the U.S. government a 15% revenue share on China sales unless the agreement is formally codified into law.
securityonline.info
August 30, 2025 at 6:35 AM
Err... how about launching a study into how gun availability contributes to mass shootings and violence? Just a suggestion... I know it sounds far fetched, but who knows?
RFK Jr on the mass shooting in Minnesota: "We're launching studies on the potential contribution of some of the SSRI drugs and some of the other psychiatric drugs that might be contributing to violence."
August 28, 2025 at 1:30 PM
Reposted by Markus
Fact check: they don't
Trump: "They call me the president of Europe. Which is an honor."
August 25, 2025 at 3:20 PM
This has to be the worst timeline ever 🤦‍♂️ Anyone have a portal gun?
EXCLUSIVE: The Trump administration will move to pull the COVID vaccine off the U.S. market “within months,” one of Robert F. Kennedy Jr.’s closest associates has told the Daily Beast.
Trump and RFK Jr. to Ban Covid-19 Vaccine ‘Within Months’
A close associate of the HHS secretary claims the U.S. government will soon pull COVID-19 mRNA jabs from the market.
trib.al
August 25, 2025 at 3:21 PM
Reposted by Markus
Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access
Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access
cybersecuritynews.com
August 16, 2025 at 12:12 PM
Sigh. Putler is playing the orange village idiot like a fiddle. Nothing good will come out of their meeting. The meeting will only play into Putins hands and enable him to show of to his domestic audience. It's going to be a sad reminder that narcissist idiots should not be voted into office.
❗️The White House is currently planning only a bilateral meeting at Putin's request, not a trilateral one, Reuters reported.

NBC News previously reported that the White House is discussing the possibility of inviting Zelensky to Alaska during the talks between Trump and Putin on August 15.
August 10, 2025 at 11:30 AM
Laughable, the harvests are going to be left on the fields and rot because no one is interested in hard work for peanuts 😒 Building homes and houses will take longer and be more expensive.
Rep. Greg Steube: "As more and more illegals are deported from our nation, it'll give the opportunity for more citizens of our country to take these jobs."
August 8, 2025 at 3:59 PM
Reposted by Markus
Critical Firmware Vulnerabilities Exposes Millions of Dell Laptops to Device Takeover and Malware Attacks
Critical Firmware Vulnerabilities Exposes Millions of Dell Laptops to Device Takeover and Malware Attacks
A wide range of vulnerabilities affects millions of Dell laptops used by government agencies, cybersecurity professionals, and enterprises worldwide.
cybersecuritynews.com
August 6, 2025 at 4:03 AM