Mark
banner
sneakymonk3y.bsky.social
Mark
@sneakymonk3y.bsky.social
uber geek blue team cyber commando bad guy annihilator @CrowdStrike OSCP GREM GC|FA/FE/IH #DFIR - head in the clouds. https://you.sneakymonkey.net
Reposted by Mark
Huntress continues to observe in-the-wild exploitation of CVE-2025-30406, a critical vulnerability in Gladinet CentreStack and Triofox
April 22, 2025 at 1:07 PM
Reposted by Mark
One of my good friends and former SOC protégé—dropping 🔥 analysis on a Monday afternoon. Epic work, @thecyber.dad 🚀

www.thecyber.dad/p/detecting-...
Detecting Fake CAPTCHA Campaigns: ClickFix, ClearFake, and Etherhide
Summary
www.thecyber.dad
April 22, 2025 at 1:01 AM
Reposted by Mark
BREAKING.

From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.
April 15, 2025 at 5:23 PM
cert.pl/uploads/docs... CERT Poland annual report.
April 4, 2025 at 6:17 AM
Reposted by Mark
Here is one for you: 50's/60's space atomic age ads.
April 1, 2025 at 3:26 AM
Reposted by Mark
Update your VMware ESX farms ASAP.

There's an in the wild exploit chain being used which does VM -> Hypervisor escape, across all versions of ESXi. Allows full cluster access.

doublepulsar.com/use-one-virt...
Use one Virtual Machine to own them all — active exploitation of ESXicape
A chain of three zero days allow threat actors to escape a Virtual Machine.
doublepulsar.com
March 5, 2025 at 11:59 AM