Ján Trenčanský
@j91321.bsky.social
170 followers 200 following 100 posts
EDR R&D team lead at ESET. Opinions are my own. @[email protected]
Posts Media Videos Starter Packs
Reposted by Ján Trenčanský
Reposted by Ján Trenčanský
bellingcat.com
Our researchers have noticed today that NASA FIRMS, one of the main free and available open source sites for monitoring fires around the world has a new notice on it stating that NASA is no longer updating the site due to a lack in federal funding. firms.modaps.eosdis.nasa.gov/map/
j91321.bsky.social
PR: October is cybersecurity awareness month! Let's start...

Me: No, nope, don't care, la la la can't hear you *𝘧𝘪𝘯𝘨𝘦𝘳𝘴 𝘪𝘯 𝘮𝘺 𝘦𝘢𝘳𝘴*
j91321.bsky.social
There's probably more, last year he did a workshop for Red team village about satellite hacking. Kind of fits the MO, pick an obscure topic and pretend you're an expert. He also has the highest number of GIAC certs obtained in shortest time I've seen. github.com/poppopjmp/RT...
GitHub - poppopjmp/RTV_LV2024: Red Team Village DEFCON 2024 - Hacking the Skies
Red Team Village DEFCON 2024 - Hacking the Skies. Contribute to poppopjmp/RTV_LV2024 development by creating an account on GitHub.
github.com
j91321.bsky.social
Yeah, VXUG posted about it some time ago, but it was Defcon. Both talks from the same guy. Both AI slop, same goes for his forked projects on GitHub.
j91321.bsky.social
I haven't found exploitation of Fortra's GoAnywhere MFT CVE-2025-10035 in EDR telemetry yet. Which means it is probably still rare and folks have some time to patch. Wonder how long it will stay that way. The previously exploited vulns appeared fairly quickly.
Reposted by Ján Trenčanský
campuscodi.risky.biz
Cisco patched 3 zero-days today...

CVE-2025-20352: sec.cloudapps.cisco.com/security/cen...

And these two used together:
-CVE-2025-20333: sec.cloudapps.cisco.com/security/cen...
-CVE-2025-20362: sec.cloudapps.cisco.com/security/cen...
Reposted by Ján Trenčanský
doublepulsar.com
Why TF are @npr.org @pbsnews.org and @wgcunews.bsky.social letting an AI cybersecurity *write an article* about a breach and make shit up?
Reposted by Ján Trenčanský
esetresearch.bsky.social
#ESETresearch has discovered the first known cases of collaboration between Gamaredon and Turla, in Ukraine. Both groups are affiliated with the FSB, Russia’s main domestic intelligence and security agency. www.welivesecurity.com/en/eset-rese...
1/3
Gamaredon X Turla collab
ESET researchers reveal how the notorious APT group Turla collaborates with fellow FSB-associated group known as Gamaredon to compromise high‑profile targets in Ukraine.
www.welivesecurity.com
Reposted by Ján Trenčanský
campuscodi.risky.biz
Three major EDR vendors have pulled out of evaluations for the MITRE ATT&CK framework

Microsoft: techcommunity.microsoft.com/blog/microso...
SentinelOne: www.sentinelone.com/blog/sentine...
Palo Alto Networks: www.paloaltonetworks.com/blog/securit...
Reposted by Ján Trenčanský
kostastsale.bsky.social
🆕 𝐄𝐃𝐑-𝐭𝐞𝐥𝐞𝐦𝐞𝐭𝐫𝐲 𝐏𝐫𝐨𝐣𝐞𝐜𝐭 𝐔𝐩𝐝𝐚𝐭𝐞 - 𝐖𝐢𝐧𝐝𝐨𝐰𝐬

The Windows table just got an update with 3 new sub-categories:

➡️ VSS Deletion
➡️ Win32 API Telemetry
➡️ JA3/JA3s

Coverage isn’t uniform, and some are pending response from the vendors. That’s fine. I’d rather show the uncertainty than pretend otherwise.
j91321.bsky.social
Ah yes, Raťafák Plachta, brings back memories. I mean horrors. The department that was responsible for kids shows in Slovak Television has a lot to answer for.
Reposted by Ján Trenčanský
esetresearch.bsky.social
HybridPetya installs a malicious EFI application to the EFI System Partition, which then encrypts the Master File Table file, an essential metadata file with information about all files on the NTFS-formatted partition. 2/8
j91321.bsky.social
Funnily Google reminded me that I was at the JLR plant in Nitra today 6 years ago. They were just revealing a new model.
A large group of employees gather inside a Jaguar Land Rover plant for a new model reveal. A covered vehicle is positioned at the floor center surrounded by people in white shirts and black trousers. A stage with a speaker and a large screen displaying the Jaguar and Land Rover logos is set up at the front. Staff line both the ground floor and the balcony above, watching the presentation in the bright atrium with large glass panels in the back showing the factory.
j91321.bsky.social
This one EDR killer crashes the whole host when EDR is present. Task failed successfully I guess?
j91321.bsky.social
Looks like everybody finally figured out the same thing I posted about almost two weeks ago.
j91321.bsky.social
Congratulations to my colleagues on this milestone. Before the headlines kick in, let's consider what this actually is, at best a new sub-technique for T1027 (Obfuscated Files or Information). Not that different from T1027.004 (Compile After Delivery) just an interesting twist on the steps.
esetresearch.bsky.social
PromptLock leverages Lua scripts generated from hard-coded prompts to enumerate the local filesystem, inspect target files, exfiltrate selected data, and perform encryption. These Lua scripts are cross-platform compatible, functioning on #Windows, #Linux, and #macOS 2/7
Reposted by Ján Trenčanský
campuscodi.risky.biz
-NoisyBear APT turns out to be a phishing test
-Qantas cuts executive pay by 15% after breach
-First AI-driven ransomware was just an academic project
-Nepal blocks 26 social media sites
-New GhostAction supply chain attack

Newsletter: news.risky.biz/risky-bullet...
Podcast: risky.biz/RBNEWS475/
j91321.bsky.social
Looks like my RuneScape account still exists after *checks notes* 12 years.
RuneScape lobby screenshot. You last logged in 4617 days ago.
j91321.bsky.social
The workshop he had on satellite hacking in Red Team Village last year also fits the pattern of choosing an obscure topic few people have a good understanding of. Too bad the Github repo on that one is empty github.com/poppopjmp/RT...
GitHub - poppopjmp/RTV_LV2024: Red Team Village DEFCON 2024 - Hacking the Skies
Red Team Village DEFCON 2024 - Hacking the Skies. Contribute to poppopjmp/RTV_LV2024 development by creating an account on GitHub.
github.com
Reposted by Ján Trenčanský
swiftonsecurity.com
Oof, the sycophancy problem in LLM's + triggering on any irrelevant details you feed them, recently led a P2 problem call down the wrong pathing for hours.

The chatbot is never going to TELL you to step back and ask if this entire inquiry is irrelevant to larger goal.

This is your moat. It's mine.
My coworkers are starting to COMPLETELY rely on ChatGPT for anything that requires troubleshooting

And the results are as predictable as you think. On the easier stuff, sure, here's a quick fix. On anything that takes even the slightest bit of troubleshooting,
"Hey LegOz, here's what ChatGPT says we should change!"...and it's something completely unrelated, plain wrong, or just made-up slop.
Reposted by Ján Trenčanský
kennwhite.bsky.social
It turns out if you social engineer someone to install a malicious browser extension, your browser can do Bad Things. The Passkey & FIDO specs explicitly say browser/endpoint compromise is not in their threat model.
Reposted by Ján Trenčanský
brody-n77.bsky.social
Ruin the industry?

As Jeremy Clarkson once said: "Oh no... anyway."

If LLMs cannot be monetized without massive sweeping intellectual property theft, then maybe they shouldn't be monetized at all. And maybe the CEOs pushing it on us aren't half the tech visionaries they think they are.