based in europe
Opinions are my own
Mastodon: https://infosec.exchange/@intuentis0x0
Reddit: https://www.reddit.com/user/intuentis0x0/
Medium: https://medium.com/@intuentis0x0
X: https://x.com/intuentis0x0
If you’re trying to build a more proactive security program, I think you’ll find it useful.
👉 Read it here: feedly.com/ti-essential...
If you’re trying to build a more proactive security program, I think you’ll find it useful.
👉 Read it here: feedly.com/ti-essential...
@werdhaihai.bsky.social just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG
@werdhaihai.bsky.social just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG
beierle.win/2025-08-28-A...
#threatresearch
beierle.win/2025-08-28-A...
#threatresearch
SEO-driven #Bumblebee malware campaigns observed throughout July led to domain compromise, data theft & #Akira ransomware. Tools included #AdaptixC2 & #Netscan.
thedfirreport.com/2025/08/05/f...
SEO-driven #Bumblebee malware campaigns observed throughout July led to domain compromise, data theft & #Akira ransomware. Tools included #AdaptixC2 & #Netscan.
thedfirreport.com/2025/08/05/f...
blog.zsec.uk/offensive-cti/
#cti #redteam
blog.zsec.uk/offensive-cti/
#cti #redteam
Here is a great site which make the leaked chats easy readable.
ransomch.at/viewer.html
Here is a great site which make the leaked chats easy readable.
ransomch.at/viewer.html
honestly I didn't understand why MS needed its own naming when they started theire Threat Actor profiling. It does make no sense if vendor start using own naming schema and it doesn't make them smart nor make them looking professional.
www.microsoft.com/en-us/securi...
honestly I didn't understand why MS needed its own naming when they started theire Threat Actor profiling. It does make no sense if vendor start using own naming schema and it doesn't make them smart nor make them looking professional.
www.microsoft.com/en-us/securi...
www.soc-cmm.com/products/soc...
www.soc-cmm.com/downloads/SO...
#soc #blueteam #cybersecurity #infosec
www.soc-cmm.com/products/soc...
www.soc-cmm.com/downloads/SO...
#soc #blueteam #cybersecurity #infosec
eventlog-compendium.streamlit.app
eventlog-compendium.streamlit.app
MITRE has announced that its funding for the Common Vulnerabilities and Exposures (CVE) program and related programs, including the Common Weakness Enumeration […]
[Original post on infosec.exchange]
MITRE has announced that its funding for the Common Vulnerabilities and Exposures (CVE) program and related programs, including the Common Weakness Enumeration […]
[Original post on infosec.exchange]
This one here gives a detailed and understandable inside of this technique for #redteam and #blueteam equally.
vari-sh.github.io/posts/doppel...
This one here gives a detailed and understandable inside of this technique for #redteam and #blueteam equally.
vari-sh.github.io/posts/doppel...
Relay attacks are more complicated than many people realize. Check out this deep dive from Elad Shamir on NTLM relay attacks & the new edges we recently added to BloodHound. ghst.ly/4lv3E31
Relay attacks are more complicated than many people realize. Check out this deep dive from Elad Shamir on NTLM relay attacks & the new edges we recently added to BloodHound. ghst.ly/4lv3E31
Fake Zoom Ends in BlackSuit Ransomware
Analysis and reporting completed by @pigerlin, UC1 and @Miixxedup
Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/03/31/f...
Fake Zoom Ends in BlackSuit Ransomware
Analysis and reporting completed by @pigerlin, UC1 and @Miixxedup
Audio: Available on Spotify, Apple, YouTube and more!
thedfirreport.com/2025/03/31/f...
My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees.
Here’s what I found and why it matters 👉 wietze.github.io/blog/bypassi...
My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees.
Here’s what I found and why it matters 👉 wietze.github.io/blog/bypassi...
#detectionengineering #blueteam #detections #infosec
detection.studio
#detectionengineering #blueteam #detections #infosec
detection.studio
#blueteam #threatreport #mitre
medium.com/mitre-engenu...
#blueteam #threatreport #mitre
medium.com/mitre-engenu...