ZealotOfLuna
banner
zealotofluna.bsky.social
ZealotOfLuna
@zealotofluna.bsky.social
Under construction, but in brief:

Father
Gamer
Leftist
Cybersecurity Specialist
Reposted by ZealotOfLuna
January 16, 2026 at 5:21 PM
Reposted by ZealotOfLuna
January 9, 2026 at 4:17 PM
Reposted by ZealotOfLuna
Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files
Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files
www.darkreading.com
December 16, 2025 at 4:41 PM
Reposted by ZealotOfLuna
December 12, 2025 at 7:07 PM
Reposted by ZealotOfLuna
December Patch Tuesday Addresses Three Zero-Days, Including Windows Hijack Vulnerability

December Patch Tuesday addressed three zero-day vulnerabilities, including a critical flaw enabling Windows device hijacking. Microsoft urged immediate patching.
December Patch Tuesday Addresses Three Zero-Days, Including Windows Hijack Vulnerability
December Patch Tuesday addressed three zero-day vulnerabilities, including a critical flaw enabling Windows device hijacking. Microsoft urged immediate patching.
concisecyber.com
December 10, 2025 at 8:31 PM
Reposted by ZealotOfLuna
🚨 SECURITY ALERT: Hackers are exploiting ChatGPT's share feature to spread AMOS malware on macOS. They're buying Google ads that lead to chatgpt.com —making the scam look 100% legitimate.

Details- www.cyberkendra.com/2025/12/hack...

#CyberSecurity #macOS #InfoStealer #chatgpt #openai
December 10, 2025 at 8:35 PM
Reposted by ZealotOfLuna
December 9, 2025 at 3:38 PM
Reposted by ZealotOfLuna
CISA reports PRC-backed hackers using BRICKSTORM malware for long-term access to US systems. The backdoor targets VMware & Windows environments, enabling stealthy control. #Cybersecurity #News
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
CISA reports PRC-backed hackers using BRICKSTORM malware for long-term access to US systems. The bac...
thehackernews.com
December 6, 2025 at 12:48 AM
Reposted by ZealotOfLuna
October 31, 2025 at 7:33 PM
Reposted by ZealotOfLuna
Struggling to secure your business during tough economic times? Read our latest blog for practical, cost-effective cybersecurity strategies to stay resilient and protected: cs.co/633287DZmE
October 29, 2025 at 2:22 PM
Reposted by ZealotOfLuna
Researchers have discovered an inexpensive, full-featured malware-as-a-service kit combining vulnerability scanning, covert access, and DNS hijacking.

www.csoonline.com/article/4080...
Atroposia malware kit lowers the bar for cybercrime — and raises the stakes for enterprise defenders
Researchers have discovered an inexpensive, full-featured malware-as-a-service kit combining vulnerability scanning, covert access, and DNS hijacking.
www.csoonline.com
October 29, 2025 at 2:48 PM
Reposted by ZealotOfLuna
Safeguard your phone from gov’t spyware!

Here’s now.

www.kaspersky.com/blog/how-to-...

🔥🔥🔥🔥🔥🔥🔥🔥🔥
October 15, 2025 at 6:46 PM
Reposted by ZealotOfLuna
📌 UEBA Thwarts Ransomware Attack: A Case Study in Early Threat Detection https://www.cyberhub.blog/article/14250-ueba-thwarts-ransomware-attack-a-case-study-in-early-threat-detection
UEBA Thwarts Ransomware Attack: A Case Study in Early Threat Detection
An Australian law firm recently demonstrated the effectiveness of User and Entity Behavior Analytics (UEBA) in preventing a potential ransomware attack. The firm's UEBA system detected anomalous file access patterns by two employees, triggering alerts due to deviations from established behavioral baselines. Subsequent investigation revealed indicators of lateral movement and privilege escalation attempts, common precursors to ransomware deployment. By intervening before data encryption or exfiltration occurred, the firm successfully neutralized the threat. This incident underscores several critical aspects of modern cybersecurity. First, it validates UEBA's role in detecting insider threats and compromised accounts. UEBA systems leverage machine learning to establish normal behavior patterns, enabling the detection of subtle anomalies that traditional security measures might miss. In this case, the early detection of unusual file access patterns provided the firm with crucial time to investigate and respond. Second, the detection of lateral movement and privilege escalation attempts highlights the importance of monitoring these activities. Lateral movement, where attackers navigate through a network to identify valuable assets, and privilege escalation, where attackers gain elevated access rights, are common tactics in advanced cyber attacks. Detecting these activities early can disrupt the attack chain and prevent more severe incidents, such as ransomware deployment. Third, this incident emphasizes the importance of a robust incident response plan. The law firm's ability to secure the system before any data encryption or exfiltration occurred demonstrates the value of quick and effective response. This proactive approach can mitigate the impact of potential breaches, preventing data loss, financial damage, and reputational harm. For cybersecurity professionals, this case study offers several actionable insights. It reinforces the importance of implementing advanced threat detection technologies like UEBA. It also highlights the need for continuous monitoring and anomaly detection to identify and respond to threats early. Furthermore, it underscores the value of having a well-defined incident response plan that can be executed swiftly and effectively. In conclusion, this incident serves as a compelling example of how advanced threat detection and effective incident response can prevent significant cyber threats. By leveraging technologies like UEBA and maintaining robust incident response capabilities, organizations can better protect themselves against ransomware and other sophisticated cyber attacks.
www.cyberhub.blog
October 11, 2025 at 2:40 PM
Reposted by ZealotOfLuna
“APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails” — Cyber Security News

#PhishingNews #ChatGPT #Malware
October 8, 2025 at 2:50 PM
Reposted by ZealotOfLuna
The popular Redis in-memory data store received a patch for a critical vulnerability that leads to remote code execution. The flaw requires authentication to exploit, but many instances don’t have authentication configured and around 60,000 of them are exposed.

www.csoonline.com/article/4069...
10.0-severity RCE flaw puts 60,000 Redis instances at risk
The critical vulnerability allows attacks to escape the in-memory data store’s Lua sandbox and subsequently execute arbitrary code on the underlying server.
www.csoonline.com
October 8, 2025 at 2:52 PM
Saw an interesting short going over ShadowLeak and how AI agent integrations opens a new attack vector for adversaries. An interesting consequence of the integration of these agents in more places.

www.youtube.com/shorts/PsGp1...
0-click WARNING: ShadowLeak in Gmail
YouTube video by David Bombal
www.youtube.com
September 22, 2025 at 3:04 PM
Reposted by ZealotOfLuna
Can you imagine if we had instead invested those funds in climate, health care, and education instead of lining the pockets of the military industrial complex?
In the 20 years following 9/11, the U.S. spent over $21 trillion on militarization.

Yesterday, the House passed an NDAA bringing us closer to a $1 trillion Pentagon budget.

For too long, hawks have used the tragedy of 9/11 to supercharge militarism at the cost of our needs and safety.

Enough.
September 11, 2025 at 8:18 PM
Reposted by ZealotOfLuna
Following Zscaler and Google, now Palo Alto Networks is disclosing a data breach involving customers' information stolen via the Salesloft Drift cyberattack.

More via Palo Alto here, too: unit42.paloaltonetworks.com/threat-brief...
Palo Alto Networks data breach exposes customer info, support tickets
Palo Alto Networks suffered a data breach that exposed customer data and support cases after attackers abused compromised OAuth tokens from the Salesloft Drift breach to access its Salesforce instance...
www.bleepingcomputer.com
September 2, 2025 at 1:29 PM
Reposted by ZealotOfLuna
The best way to avoid phishing attacks is to know how they work and what they’re after. Here’s a primer to get you started. ssd.eff.org/module/how-...
How to: Avoid Phishing Attacks
On your path to improving your digital security, you may encounter bad actors who attempt to undermine your security goals. We call these bad actors adversaries. When an adversary sends an email (or text message or message in an app) or link that looks innocent, but is actually malicious it’s...
ssd.eff.org
August 29, 2025 at 7:02 PM
Reposted by ZealotOfLuna
Buckle up.

Here’s why we might be headed towards “stagflation.”
August 23, 2025 at 4:00 PM
Reposted by ZealotOfLuna
August 23, 2025 at 5:34 PM
Reposted by ZealotOfLuna
The most powerful force in American politics today is antiestablishment rage at a system that’s rigged against most people.

Democrats should ignore the carping of corporate and Wall Street Democrats and embrace Mamdani and other young progressives as the future of the party.
August 15, 2025 at 10:01 PM
Reposted by ZealotOfLuna
August 16, 2025 at 12:18 PM
Reposted by ZealotOfLuna
Throughout history, tyrants have understood that their major enemy is an educated public.

Trump is no different. That’s why he’s trying to control not just what we do – but what we think.

Watch: https://youtu.be/rEH7sF6pA4s?si=zC1tb0MqvpyTQNKC
Why Does Trump Hate Sesame Street?
Why is Trump so hell-bent on defunding PBS? It’s part of a larger plan — one where he can control not just what we do, b
youtu.be
July 21, 2025 at 1:01 AM