mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.1K
active users

#threatdetection

4 posts4 participants0 posts today
linuxLiving Off the Land: Turning Trusted Tools into Silent Weapons Living Off the Land(LOTL): Turning Trusted Tools into Silent&nbsp;Weapons The Sharpest attacks are the ones you never see coming because t...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/threat-detection" target="_blank">#threat-detection</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/red-teaming" target="_blank">#red-teaming</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/ethical-hacking" target="_blank">#ethical-hacking</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/malware" target="_blank">#malware</a><br><br><a href="https://infosecwriteups.com/living-off-the-land-turning-trusted-tools-into-silent-weapons-7a3da45ea004?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=linux" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=UVSpirIi0ZFDyZQqCLVgxs30zFw&amp;interestId=linux" rel="nofollow noopener" target="_blank">Match</a>
Tedi Heriyanto<p>The double-edged sword of MCP: Understanding the threat landscape for AI workflows: <a href="https://redcanary.com/blog/threat-detection/mcp-ai-workflows/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redcanary.com/blog/threat-dete</span><span class="invisible">ction/mcp-ai-workflows/</span></a></p><p><a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/mcp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mcp</span></a></p>
Just Another Blue Teamer<p>Good day everyone! </p><p>Somehow I missed this article when it first dropped but at least I found it! The DFIR Report published another great article that involved the <a href="https://ioc.exchange/tags/Bumblebee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bumblebee</span></a> malware as the initial access vector that was installed after a user fell victim to an SEO poisoning campaign. The report states that "the threat actor moved laterally to a domain controller, dumped credentials, installed persistent remote access tools, and exfiltrated data using an SFTP client." The adversary also created two new domain accounts and used one to connect to a domain controller via RDP and dumped the NTDS.dit file using wbadmin.exe.</p><p>There are more technical details along with some great queries to use to aid your threat hunting and detection engineering efforts! As always, thank you to the authors for a great report! Happy Hunting!</p><p>From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira<br><a href="https://thedfirreport.com/2025/08/05/from-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedfirreport.com/2025/08/05/f</span><span class="invisible">rom-bing-search-to-ransomware-bumblebee-and-adaptixc2-deliver-akira/</span></a></p><p>Intel 471 Cyborg Security, Now Part of Intel 471 <a href="https://ioc.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://ioc.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a> <a href="https://ioc.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://ioc.exchange/tags/IntelDrivenThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IntelDrivenThreatHunting</span></a> <a href="https://ioc.exchange/tags/HappyHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HappyHunting</span></a> <a href="https://ioc.exchange/tags/readoftheday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>readoftheday</span></a></p>
Pyrzout :vm:<p>Why 90% of cyber leaders are feeling the heat <a href="https://www.helpnetsecurity.com/2025/08/06/managing-cyber-risk-practices/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/06</span><span class="invisible">/managing-cyber-risk-practices/</span></a> <a href="https://social.skynetcloud.site/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://social.skynetcloud.site/tags/riskmanagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>riskmanagement</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/monitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>monitoring</span></a> <a href="https://social.skynetcloud.site/tags/cyberrisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberrisk</span></a> <a href="https://social.skynetcloud.site/tags/BitSight" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitSight</span></a> <a href="https://social.skynetcloud.site/tags/burnout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>burnout</span></a> <a href="https://social.skynetcloud.site/tags/report" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>report</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
IT News<p>Microsoft’s new AI reverse-engineers malware autonomously, marking a shift in cybersecurity - Microsoft says its new system could eventually detect new types of malware direct... - <a href="https://www.geekwire.com/2025/microsofts-new-ai-reverse-engineers-malware-autonomously-marking-a-shift-in-cybersecurity/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">geekwire.com/2025/microsofts-n</span><span class="invisible">ew-ai-reverse-engineers-malware-autonomously-marking-a-shift-in-cybersecurity/</span></a> <a href="https://schleuss.online/tags/securefutureinitiative" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securefutureinitiative</span></a> <a href="https://schleuss.online/tags/largelanguagemodels" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>largelanguagemodels</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/aimalwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aimalwareanalysis</span></a> <a href="https://schleuss.online/tags/microsoftdefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftdefender</span></a> <a href="https://schleuss.online/tags/malwaredetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwaredetection</span></a> <a href="https://schleuss.online/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://schleuss.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://schleuss.online/tags/autonomousai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>autonomousai</span></a> <a href="https://schleuss.online/tags/zerodayquest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerodayquest</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a></p>
Tedi Heriyanto<p>A defender’s guide to initial access techniques: <a href="https://redcanary.com/blog/threat-detection/initial-access-techniques/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redcanary.com/blog/threat-dete</span><span class="invisible">ction/initial-access-techniques/</span></a></p><p><a href="https://infosec.exchange/tags/initialaccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>initialaccess</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a></p>
Seasia Infotech<p>AI to the Rescue: Smarter, Faster, and Stronger Data Breach Defense</p><p>As cyber threats grow more complex, artificial intelligence is stepping up to revolutionize data security. Discover how AI is transforming the way organizations detect, prevent, and respond to data breaches—setting new benchmarks in real-time threat intelligence, anomaly detection, and adaptive defense.</p><p>Read more: <a href="https://www.newspostonline.com/future/ai/how-ai-is-setting-new-standards-for-data-breach-prevention-and-detection/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">newspostonline.com/future/ai/h</span><span class="invisible">ow-ai-is-setting-new-standards-for-data-breach-prevention-and-detection/</span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.social/tags/AIinCyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIinCyberSecurity</span></a> <a href="https://mastodon.social/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a></p>
sydney<p>🌵 Calm before the Hacker Summer Camp storm.</p><p>July’s Dispatch Debrief is light on posts, heavy on hot takes — from agentic AI to making pentest findings sting.</p><p>Catch up before Vegas 👉 <a href="https://dispatch.thorcollective.com/p/dispatch-debrief-july-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">dispatch-debrief-july-2025</span></a> </p><p><a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/thrunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thrunting</span></a> <a href="https://infosec.exchange/tags/THORcollective" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>THORcollective</span></a> <a href="https://infosec.exchange/tags/hackersummercamp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackersummercamp</span></a> <a href="https://infosec.exchange/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://infosec.exchange/tags/blackhat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackhat</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Netzpalaver<p>Führungsetagen zu KI in der Cyberabwehr - Heute Unsicherheit, morgen Schlüsselrolle</p><p><a href="https://social.tchncs.de/tags/Cyberabwehr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberabwehr</span></a> <a href="https://social.tchncs.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.tchncs.de/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersicherheit</span></a> <a href="https://social.tchncs.de/tags/Deepfake" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deepfake</span></a> <a href="https://social.tchncs.de/tags/EMailSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EMailSicherheit</span></a> <a href="https://social.tchncs.de/tags/k%C3%BCnstlicheIntelligenz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>künstlicheIntelligenz</span></a> <a href="https://social.tchncs.de/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> @Sophos <a href="https://social.tchncs.de/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> @Sophos_Info</p><p><a href="https://netzpalaver.de/2025/07/31/fuehrungsetagen-zu-ki-in-der-cyberabwehr-heute-unsicherheit-morgen-schluesselrolle/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/07/31/fueh</span><span class="invisible">rungsetagen-zu-ki-in-der-cyberabwehr-heute-unsicherheit-morgen-schluesselrolle/</span></a></p>
Dhaal.io<p>Cyber threats are evolving fast — from AI-driven phishing to deepfake scams and cloud misconfigurations. Even low-skilled attackers now have access to Ransomware-as-a-Service.</p><p>📉 Don’t let your guard down. Stay informed, stay protected.</p><p>📬 Subscribe for weekly insights into cybersecurity trends, threats, and solutions.<br><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Deepfake" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deepfake</span></a> <a href="https://mastodon.social/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://mastodon.social/tags/Dhaalai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dhaalai</span></a></p>
sydney<p>Threat hunting is broken.<br>We can’t out-query adversaries who automate everything.<br>Enter the agentic threat hunter. An AI that thinks, hypothesizes, investigates, and scales.</p><p>In the latest Dispatch, we explore how you can take small, practical steps toward this shift: <br>📌 <a href="https://dispatch.thorcollective.com/p/the-agentic-threat-hunter" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dispatch.thorcollective.com/p/</span><span class="invisible">the-agentic-threat-hunter</span></a></p><p>The future of hunting? Agents that don’t just help, they hunt.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/thrunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thrunting</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/agenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>agenticAI</span></a> <a href="https://infosec.exchange/tags/THORcollective" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>THORcollective</span></a></p>
2rZiKKbOU3nTafniR2qMMSE0gwZThe New Cyber Sentinel: How AI Is Transforming Threat Detection By Md Shafiqul Baten Sumon Continue reading on Medium » <br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/cybersecurity" target="_blank">#cybersecurity</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/artificial-intelligence" target="_blank">#artificial-intelligence</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/machine-learning" target="_blank">#machine-learning</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/threat-detection" target="_blank">#threat-detection</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/infosec" target="_blank">#infosec</a><br><br><a href="https://medium.com/@shafiqulsumon007/the-new-cyber-sentinel-how-ai-is-transforming-threat-detection-2b8a3b861332?source=rss------machine_learning-5" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=CdDR0FQLutKQucKJxzIkopjJfvs&amp;interestId=2rZiKKbOU3nTafniR2qMMSE0gwZ" rel="nofollow noopener" target="_blank">Match</a>
Josh Lemon<p>"I SPy" Entra ID Global Admin Escalation Technique</p><p>Datadog's Security Labs identified an abuse of Office 365 Exchange Online service principal (SP) allowing escalation to Global Admin. MSRC considers it "expected misconfiguration" so don't expect a fix.</p><p>🚨 Alert on new credentials added to SPs.<br>🔥 Monitor changes to federated domains (federationConfiguration).<br>🕵🏼‍♂️ Hunt unusual Graph API calls to /domains, /credentials, and /federationConfiguration.</p><p>🔗 <a href="https://securitylabs.datadoghq.com/articles/i-spy-escalating-to-entra-id-global-admin/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securitylabs.datadoghq.com/art</span><span class="invisible">icles/i-spy-escalating-to-entra-id-global-admin/</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a> <a href="https://infosec.exchange/tags/EntraID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EntraID</span></a> <a href="https://infosec.exchange/tags/CloudForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudForensics</span></a> <a href="https://infosec.exchange/tags/M365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>M365</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a></p>
Just Another Blue Teamer<p>Happy Friday everyone! </p><p>Researchers from the FortiCNAPP team, part of FortiGuard Labs identified a new variant of the <a href="https://ioc.exchange/tags/Lcryx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lcryx</span></a> ransomware called <a href="https://ioc.exchange/tags/Lcrypt0rx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lcrypt0rx</span></a>. The report states that it "is a relatively new VBScript-based ransomware strain first observed in November 2024" and "exhibits several unusual characteristics that suggest it may have been generated using AI." According to the researchers, it currently only targets Windows machines. </p><p>Indicators that led the researchers to believe it is AI generated include:<br>- Function Duplication<br>- Incorrect Persistence Mechanisms<br>- Nonexistent Target Paths<br>- Invalid Ransom Note URL<br>- Ineffective AV Disabling</p><p>These are just a few indicators and the article provides more details about each indicator, but I am not going to spoil the fun! Go and check it out for yourself! Enjoy and Happy Hunting!</p><p>Old Miner, New Tricks: H2miner Resurfaces with Lcrypt0rx Ransomware<br><a href="https://www.fortinet.com/blog/threat-research/old-miner-new-tricks" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortinet.com/blog/threat-resea</span><span class="invisible">rch/old-miner-new-tricks</span></a></p><p>Intel 471 Cyborg Security, Now Part of Intel 471 <a href="https://ioc.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://ioc.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a> <a href="https://ioc.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://ioc.exchange/tags/HappyHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HappyHunting</span></a> <a href="https://ioc.exchange/tags/readoftheday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>readoftheday</span></a> <a href="https://ioc.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://ioc.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://ioc.exchange/tags/artificialintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>artificialintelligence</span></a></p>
Tedi Heriyanto<p>Detection Engineering: Practicing Detection-as-Code</p><p>- Part 1: <a href="https://blog.nviso.eu/2025/07/08/detection-engineering-practicing-detection-as-code-introduction-part-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.nviso.eu/2025/07/08/detec</span><span class="invisible">tion-engineering-practicing-detection-as-code-introduction-part-1/</span></a></p><p>- Part 2: <a href="https://blog.nviso.eu/2025/07/17/detection-engineering-practicing-detection-as-code-repository-part-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.nviso.eu/2025/07/17/detec</span><span class="invisible">tion-engineering-practicing-detection-as-code-repository-part-2/</span></a></p><p><a href="https://infosec.exchange/tags/detectionengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>detectionengineering</span></a> <a href="https://infosec.exchange/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://infosec.exchange/tags/DetectionAsCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DetectionAsCode</span></a></p>
Just Another Blue Teamer<p>Good day everyone!</p><p>Cisco Talos researchers report on a malware-as-a-service (MaaS) operation that was targeting Ukrainian entities and involved the <a href="https://ioc.exchange/tags/Amadey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amadey</span></a> trojan, known for "collecting system information and downloading secondary payloads" and the <a href="https://ioc.exchange/tags/Emmenhtal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emmenhtal</span></a> downloader. </p><p>Behaviors that are observed in this attack include a BUNCH of powershell activity with obfuscation and dropping a legitimate copy of PuTTY.exe. Looking at the technical details, they also us some URLs that may look legitimate to their targets in Ukraine as they add the value "ukraine2" in the URL. Finally, the attack involved multiple variants of the Emmenhtal downloader that were masquerading as MP4 files. </p><p>As usual, I glossed over many of the technical details so you can go enjoy the article without me spoiling it! Thanks to the researchers and authors and Happy Hunting!</p><p>MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities<br><a href="https://lnkd.in/gUisprru" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/gUisprru</span><span class="invisible"></span></a></p><p>Intel 471 Cyborg Security, Now Part of Intel 471#ThreatIntel <a href="https://ioc.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a> <a href="https://ioc.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://ioc.exchange/tags/HappyHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HappyHunting</span></a> <a href="https://ioc.exchange/tags/readoftheday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>readoftheday</span></a></p>
Pyrzout :vm:<p>Tired of gaps in your security? These open-source tools can help <a href="https://www.helpnetsecurity.com/2025/07/17/open-source-threat-detection-solutions/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/07/17</span><span class="invisible">/open-source-threat-detection-solutions/</span></a> <a href="https://social.skynetcloud.site/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/SIEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SIEM</span></a></p>
Just Another Blue Teamer<p>Happy Wednesday everyone!</p><p>News broke that <a href="https://ioc.exchange/tags/SaltTyphoon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SaltTyphoon</span></a> gained access to the U.S. National Guard's network "and, among other things, collected its network configuration and its data traffic with its counterparts’ networks in every other US state and at least four US territories, according to a DOD report. This data also included these networks’ administrator credentials and network diagrams—which could be used to facilitate follow-on Salt Typhoon hacks of these units." </p><p>I am posting this as situational awareness and I never try to strike fear in the community, so I want to remind everyone of the great resources that exist out there when you want to threat hunt or you are trying to detect activity related to different <a href="https://ioc.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> groups or malware! Check out the article posted below and check the comments for resources I would recommend using to supplement your threat hunting or blue team efforts! Enjoy and Happy Hunting! </p><p>DHS Salt Typhoon<br><a href="https://www.documentcloud.org/documents/25998809-20250611-dhs-salt-typhoon/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">documentcloud.org/documents/25</span><span class="invisible">998809-20250611-dhs-salt-typhoon/</span></a></p><p>Intel 471 Cyborg Security, Now Part of Intel 471 <a href="https://ioc.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://ioc.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a> <a href="https://ioc.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://ioc.exchange/tags/HappyHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HappyHunting</span></a> <a href="https://ioc.exchange/tags/readoftheday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>readoftheday</span></a></p>
Pen Test Partners<p>A critical vulnerability in old Telerik software gave an attacker remote code execution on an SFTP-only Windows server. That meant they didn’t need credentials, antivirus didn’t trigger, and default log sizes meant almost nothing useful was captured.</p><p>From there? PowerShell exclusions, admin account created, RDP tunnelled in via Ngrok, ransomware deployed. </p><p>They even opened Pornhub either to cover traffic or celebrate the moment. Who knows?</p><p>This attack wasn’t subtle. But it worked because basic controls were missing. </p><p>We’ve broken down the incident. Plus, recommendations you can act on now to prevent the same thing.</p><p>📌<a href="https://www.pentestpartners.com/security-blog/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/sil3ncer-deployed-rce-porn-diversion-and-ransomware-on-an-sftp-only-server/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
Pyrzout :vm:<p>Rethinking API Security: Confronting the Rise of Business Logic Attacks (BLAs) – Source: securityboulevard.com <a href="https://ciso2ciso.com/rethinking-api-security-confronting-the-rise-of-business-logic-attacks-blas-source-securityboulevard-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/rethinking-api-s</span><span class="invisible">ecurity-confronting-the-rise-of-business-logic-attacks-blas-source-securityboulevard-com/</span></a> <a href="https://social.skynetcloud.site/tags/SecurityBoulevard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityBoulevard</span></a>(Original) <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/BusinessLogicAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BusinessLogicAttack</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityBoulevard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityBoulevard</span></a> <a href="https://social.skynetcloud.site/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://social.skynetcloud.site/tags/SocialFacebook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialFacebook</span></a> <a href="https://social.skynetcloud.site/tags/SocialLinkedIn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialLinkedIn</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/APIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APIsecurity</span></a> <a href="https://social.skynetcloud.site/tags/SocialX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialX</span></a> <a href="https://social.skynetcloud.site/tags/traffic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>traffic</span></a> <a href="https://social.skynetcloud.site/tags/BLAs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BLAs</span></a></p>