cyberresearch.bsky.social
@cyberresearch.bsky.social
Originally from TrustedSec: Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach ( :-{ı▓ #trustedsec #pentesting #cyberresearch
Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach
Introducing a custom model for understanding privileged roles in Microsoft Entra ID, developed by TrustedSecWhenever our team conducts a Hardening Review of Microsoft Entra, 365, or Azure, we always emphasize protecting…
trustedsec.com
November 12, 2025 at 9:19 PM
Originally from BHIS: X-Typhon - Not your Father's China with John Strand ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
X-Typhon - Not your Father's China with John Strand
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Are you defending against yesterday’s threats while China is preparing for tomorrow’s? Over the past couple of years, China has upped their game. With the Salt Typhon and Volt Typhon campaigns, we’ve seen a massive increase in capability and focus in Chinese cyber operations. Join me (Founder/Owner, Black Hills Information Security) for a free one-hour webcast where I’ll discuss the historical context behind what China is doing right now and how we got here. Look, I usually hate talking about specific threat actors and what they’re doing. Defense is a game of consistently applied fundamentals. But this is different. What China is becoming is far more frightening than what we’ve been dealing with. I seriously doubt most orgs are ready for it because they’ve been so focused on ransomware. Fair warning: my undergrad degree was in PoliSci, so there will be a fair amount of history and background around the key players. Chat with your fellow attendees in the Black Hills Infosec Discord server: https://discord.gg/BHIS in the #🔴live-chat channel.
www.youtube.com
November 11, 2025 at 1:20 PM
Originally from Unit 42: You Thought It Was Over? Authentication Coercion Keeps Evolving ( :-{ı▓ #unit42 #threathunting #cyberresearch
You Thought It Was Over? Authentication Coercion Keeps Evolving
A new type of authentication coercion attack exploits an obscure and rarely monitored remote procedure call (RPC) interface. The post You Thought It Was Over? Authentication Coercion Keeps Evolving appeared first on Unit 42.
unit42.paloaltonetworks.com
November 11, 2025 at 1:06 PM
Originally from DataDog: A 2025 look at real-world Kubernetes version adoption ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
A 2025 look at real-world Kubernetes version adoption | Datadog Security Labs
A 2025 look at real-world Kubernetes version adoption
securitylabs.datadoghq.com
November 10, 2025 at 1:08 PM
Originally from Red Canary: A defender’s guide to phishing ( :-{ı▓ #threatintel #redcanary #cyberresearch
A defender’s guide to phishing
Experts from Red Canary, MITRE ATT&CK®, and CrowdStrike walk through how to detect and prevent the many varieties of phishing.
redcanary.com
November 7, 2025 at 1:18 PM
Originally from Unit 42: LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices ( :-{ı▓ #unit42 #threathunting #cyberresearch
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices
Commercial-grade LANDFALL spyware exploits CVE-2025-21042 in Samsung Android’s image processing library. The spyware was embedded in malicious DNG files. The post LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices appeared first on Unit 42.
unit42.paloaltonetworks.com
November 7, 2025 at 1:18 PM
Originally from TrustedSec: CMMC Subcontractors and Service Providers ( :-{ı▓ #trustedsec #pentesting #cyberresearch
CMMC Subcontractors and Service Providers
Defense contractors are preparing their systems for the start of the upcoming CMMC rollout but what they may not have considered is how their relationship with Subcontractors and External Service Providers (ESPs),…
trustedsec.com
November 6, 2025 at 2:56 PM
Originally from Unit 42: Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management ( :-{ı▓ #unit42 #threathunting #cyberresearch
Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management
Effective cyber defense starts with knowing your own network. Unit 42 explains why asset management is the foundation of threat intelligence. The post Know Ourselves Before Knowing Our Enemies: Threat Intelligence at the Expense of Asset Management appeared first on Unit 42.
unit42.paloaltonetworks.com
November 6, 2025 at 1:22 PM
Originally from DataDog: MUT-4831: Trojanized npm packages deliver Vidar infostealer malware ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
MUT-4831: Trojanized npm packages deliver Vidar infostealer malware
Analysis of a threat actor campaign targeting Windows users with Vidar infostealer malware via malicious npm packages
securitylabs.datadoghq.com
November 6, 2025 at 1:20 PM
Originally from Red Canary: Red Canary CFP tracker: November 2025 ( :-{ı▓ #threatintel #redcanary #cyberresearch
Red Canary CFP tracker: November 2025
Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines
redcanary.com
November 4, 2025 at 1:28 PM
Originally from Red Canary: Unmasking risks that haunt your supply chain ( :-{ı▓ #threatintel #redcanary #cyberresearch
Unmasking risks that haunt your supply chain
A spooky guide to supply chain vulnerabilities with advice on how to scare off adversaries from your system
redcanary.com
November 1, 2025 at 1:36 PM
Originally from DataDog: Datadog threat roundup: Top insights for Q3 2025 ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
Datadog threat roundup: Top insights for Q3 2025
Threat insights from Datadog Security Labs for Q3 2025.
securitylabs.datadoghq.com
November 1, 2025 at 1:35 PM