Vulnerability research, exploit prototypes, and adversarial testing from the southern hemisphere.
Blackcastle — researching tomorrow’s vulns, today.
With ICS phishing, the malicious calendar event often survives and keeps firing reminders.
How attackers abuse calendars and how to stop it !
blackcastle.com.au/blog/ics-phi...
#GoogleWorkspace #Microsoft365 #redteam #SocialEngineering #APTTradecraft
With ICS phishing, the malicious calendar event often survives and keeps firing reminders.
How attackers abuse calendars and how to stop it !
blackcastle.com.au/blog/ics-phi...
#GoogleWorkspace #Microsoft365 #redteam #SocialEngineering #APTTradecraft
Microsoft Dev Tunnels, cloud storage, signed binaries, all abused as stealthy C2.
This is trust exploitation at scale.
🔗 blackcastle.com.au/blog/apt31-t...
#APT #ThreatIntelligence #CloudSecurity #DetectionEngineering #CyberSecurity #Maldev #offsec
Microsoft Dev Tunnels, cloud storage, signed binaries, all abused as stealthy C2.
This is trust exploitation at scale.
🔗 blackcastle.com.au/blog/apt31-t...
#APT #ThreatIntelligence #CloudSecurity #DetectionEngineering #CyberSecurity #Maldev #offsec
“Panda Mirror: How the Chinese CCP manipulates NPM to horde malware.”
Watch here: youtu.be/oBzG7XOByII
“Panda Mirror: How the Chinese CCP manipulates NPM to horde malware.”
Watch here: youtu.be/oBzG7XOByII
Blog here: blackcastle.com.au/blog/shai-hu...
Blog here: blackcastle.com.au/blog/shai-hu...