Adrian Anglin
banner
andranglin.bsky.social
Adrian Anglin
@andranglin.bsky.social
Cybersecurity Enthusiast | Cloud & On-Prem Security Operations | Threat Hunting | DFIR
Skilled in threat detection & response, with a drive for ongoing skill growth.

Website: https://rootguard.git
Pinned
Active Directory compromise is a top threat. Detect with event log monitoring & anomalous behaviour tracking.

Mitigate by enforcing least privilege, patching, and MFA.

More tips:
rootguard.gitbook.io/cyberops/soc...
Active Directory Compromise—Detection and Mitigation | RootGuard
rootguard.gitbook.io
Essential Client-Side Vulnerabilities that Every Pentester Should Know:
hacklido.com/blog/1117-es...
Essential Client-Side Vulnerabilities that Every Pentester Should Know
Introduction Here in the 27th blog in our 30-project blog series on web security, we move to another set of attack vectors, the client-side attack ve...
hacklido.com
June 24, 2025 at 9:09 AM
OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals
any.run/cybersecurit...
OtterCookie: Analysis of New Lazarus Group Malware
Explore in-depth technical analysis of OtterCookie, a new North Korean Lazarus APT malware that steals victims' crypto and credentials.
any.run
June 12, 2025 at 3:29 PM
How Adversary Telegram Bots Help to Reveal Threats: Case Study
any.run/cybersecurit...
How Adversary Telegram Bots Help to Reveal Threats: Case Study  - ANY.RUN's Cybersecurity Blog
Discover how to intercept data stolen by cybercriminals via Telegram bots and learn to use it to clarify related threat landscape.
any.run
June 12, 2025 at 3:29 PM
Cyber Attacks on Government Agencies: Detect and Investigate with ANY.RUN for Fast Response
any.run/cybersecurit...
Cyber Attacks on Government Agencies: Detect and Investigate
Discover analysis of real-world cyber attacks on government organizations and see how ANY.RUN can help detect and investigate them.
any.run
June 12, 2025 at 6:42 AM
How MSSPs Can Analyze and Investigate Phishing Attacks with ANY.RUN
any.run/cybersecurit...
How MSSPs Can Analyze and Investigate Phishing Attacks
See a case study on how MSSPs can track down active phishing campaigns, identify their targets, and collect IOCs with ANY.RUN.
any.run
June 12, 2025 at 6:41 AM
PHP Type Juggling Explained: The Silent Security Risk Lurking in Web Applications
hacklido.com/blog/1107-ph...
PHP Type Juggling Explained: The Silent Security Risk Lurking in Web Applications
Did you ever think about the reason some PHP applications can still be bypassed after various hard-to-guess login tries? Type juggling can be a helpful f...
hacklido.com
June 8, 2025 at 5:32 PM
Introduction to Threat Intelligence ETW
undev.ninja/introduction...
Introduction to Threat Intelligence ETW
A quick look into ETW capabilities against malicious API calls.
undev.ninja
June 7, 2025 at 3:50 PM
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
blog.talosintelligence.com/pathwiper-ta...
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
Cisco Talos observed a destructive attack on a critical infrastructure entity within Ukraine, using a previously unknown wiper we are calling “PathWiper.”
blog.talosintelligence.com
June 7, 2025 at 3:45 PM
Fake WordPress Caching Plugin Used to Steal Admin Credentials
blog.sucuri.net/2025/06/fake...
Fake WordPress Caching Plugin Used to Steal Admin Credentials
Uncover the dangers of a malicious plugin that can steal admin credentials and compromise your WordPress site security.
blog.sucuri.net
June 7, 2025 at 3:44 PM
Spear Phishing in Armenia: Inside a Persistent Campaign by UNC5792
cyberhub.am/en/blog/2025...
Spear Phishing in Armenia: Inside a Persistent Campaign by UNC5792 - CyberHUB-AM
In early March 2025, CyberHUB-AM identified a targeted spear phishing campaign focused […]
cyberhub.am
June 4, 2025 at 7:23 AM
SCIM Hunting - Beyond SSO
blog.doyensec.com/2025/05/08/s...
SCIM Hunting - Beyond SSO · Doyensec's Blog
SCIM Hunting - Beyond SSO
blog.doyensec.com
May 31, 2025 at 3:19 PM
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign
censys.com/blog/trackin...
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign
censys.com
May 31, 2025 at 3:18 PM
LOLCLOUD - Azure Arc - C2aaS
Exploring Azure Arc’s overlooked C2aaS potential. Attacking and Defending against its usage and exploring usecases.
blog.zsec.uk/azure-arc-c2...
Azure Arc - C2aaS
Exploring Azure Arc’s overlooked C2aaS potential. Attacking and Defending against its usage and exploring usecases.
blog.zsec.uk
May 31, 2025 at 3:17 PM
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites
cloud.google.com/blog/topics/...
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites | Google Cloud Blog
Cybercriminals are using fake AI-themed ads and websites to deliver malware such as infostealers and backdoors.
cloud.google.com
May 28, 2025 at 7:42 AM
Implementing SIEM and SOAR platforms
www.cyber.gov.au/resources-bu...
www.cyber.gov.au
May 27, 2025 at 4:00 PM