digicatMEnglish · 1 month agoDaily BlueTeamSec Briefing Archive - daily AI generated podcast of the last 24hours of postsplus-squarepinbriefing.workshop1.netexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down11
arrow-up11arrow-down1external-linkDaily BlueTeamSec Briefing Archive - daily AI generated podcast of the last 24hours of postsplus-squarepinbriefing.workshop1.netdigicatMEnglish · 1 month agomessage-square0linkfedilink
digicatMEnglish · 9 hours agoThe Mother of All AI Supply Chains: Critical, Systemic Vulnerability at the Core of Anthropic’s MCP - Anthropic design choice Exposes 150M+ Downloads and up to 200K Servers to complete takeoverplus-squarewww.ox.securityexternal-linkmessage-square1linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkThe Mother of All AI Supply Chains: Critical, Systemic Vulnerability at the Core of Anthropic’s MCP - Anthropic design choice Exposes 150M+ Downloads and up to 200K Servers to complete takeoverplus-squarewww.ox.securitydigicatMEnglish · 9 hours agomessage-square1linkfedilink
digicatMEnglish · 9 hours agoChasing an Angry Spark - "A VM-obfuscated backdoor observed on a single machine in the UK, operated for one year, and vanished without a trace."plus-squarewww.gendigital.comexternal-linkmessage-square0linkfedilinkarrow-up110arrow-down10
arrow-up110arrow-down1external-linkChasing an Angry Spark - "A VM-obfuscated backdoor observed on a single machine in the UK, operated for one year, and vanished without a trace."plus-squarewww.gendigital.comdigicatMEnglish · 9 hours agomessage-square0linkfedilink
digicatMEnglish · 9 hours agoFrom fake Proton VPN sites to gaming mods, this Windows infostealer is everywhereplus-squarewww.malwarebytes.comexternal-linkmessage-square0linkfedilinkarrow-up18arrow-down10
arrow-up18arrow-down1external-linkFrom fake Proton VPN sites to gaming mods, this Windows infostealer is everywhereplus-squarewww.malwarebytes.comdigicatMEnglish · 9 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoUnderstanding security warnings when opening Remote Desktop (RDP) filesplus-squarelearn.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkUnderstanding security warnings when opening Remote Desktop (RDP) filesplus-squarelearn.microsoft.comdigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 6 hours ago“Tell Them They Are a Responsible Entity, Not a Customer”: Understanding Practitioner Challenges in Sector CSIRTsplus-squaredl.acm.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link“Tell Them They Are a Responsible Entity, Not a Customer”: Understanding Practitioner Challenges in Sector CSIRTsplus-squaredl.acm.orgdigicatMEnglish · 6 hours agomessage-square0linkfedilink
digicatMEnglish · 10 hours agoNIST Updates NVD Operations to Address Record CVE Growthplus-squarewww.nist.govexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNIST Updates NVD Operations to Address Record CVE Growthplus-squarewww.nist.govdigicatMEnglish · 10 hours agomessage-square0linkfedilink
digicatMEnglish · 10 hours agoRedSun: Windows Defender realizes that a malicious file has a cloud tag decides that it is a good idea to just rewrite the file it found again to it's original location. The PoC abuses this behaviourplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkRedSun: Windows Defender realizes that a malicious file has a cloud tag decides that it is a good idea to just rewrite the file it found again to it's original location. The PoC abuses this behaviourplus-squaregithub.comdigicatMEnglish · 10 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoQEMU abused to evade detection and enable ransomware deliveryplus-squarewww.sophos.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkQEMU abused to evade detection and enable ransomware deliveryplus-squarewww.sophos.comdigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoSmoking out an affiliate: SmokedHam, Qilin, a few Google ads and some bosswareplus-squarewww.orangecyberdefense.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSmoking out an affiliate: SmokedHam, Qilin, a few Google ads and some bosswareplus-squarewww.orangecyberdefense.comdigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoMinister: Swedish heating plant targeted by pro-Russian cyberattackenergywatch.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMinister: Swedish heating plant targeted by pro-Russian cyberattackenergywatch.comdigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 9 hours agoWhen PUPs Grow Fangs: Dragon Boss Solutions' $10 Supply Chain Risk | Huntressplus-squarewww.huntress.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkWhen PUPs Grow Fangs: Dragon Boss Solutions' $10 Supply Chain Risk | Huntressplus-squarewww.huntress.comdigicatMEnglish · 9 hours agomessage-square0linkfedilink
digicatMEnglish · 9 hours agoMCP Supply Chain Advisory: RCE Vulnerabilities Across the AI Ecosystemplus-squarewww.ox.securityexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkMCP Supply Chain Advisory: RCE Vulnerabilities Across the AI Ecosystemplus-squarewww.ox.securitydigicatMEnglish · 9 hours agomessage-square0linkfedilink
digicatMEnglish · 9 hours agonano-analyzer: A minimal LLM-powered zero-day vulnerability scannerplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linknano-analyzer: A minimal LLM-powered zero-day vulnerability scannerplus-squaregithub.comdigicatMEnglish · 9 hours agomessage-square0linkfedilink
digicatMEnglish · 10 hours agoDissecting Sapphire Sleet’s macOS intrusion from lure to compromise | Microsoft Security Blogplus-squarewww.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10cross-posted to: blueteamsec
arrow-up12arrow-down1external-linkDissecting Sapphire Sleet’s macOS intrusion from lure to compromise | Microsoft Security Blogplus-squarewww.microsoft.comdigicatMEnglish · 10 hours agomessage-square0linkfedilinkcross-posted to: blueteamsec
digicatMEnglish · 10 hours agoBlueSAM: A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkBlueSAM: A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.plus-squaregithub.comdigicatMEnglish · 10 hours agomessage-square0linkfedilink
digicatMEnglish · 10 hours agowcfproxy: A proxy for net.tcp-based WCF traffic.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkwcfproxy: A proxy for net.tcp-based WCF traffic.plus-squaregithub.comdigicatMEnglish · 10 hours agomessage-square0linkfedilink
digicatMEnglish · 10 hours agoBSIM explained once and for all! - Ghidra's Behavioral Similarity (BSIM)plus-squareblog.quarkslab.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBSIM explained once and for all! - Ghidra's Behavioral Similarity (BSIM)plus-squareblog.quarkslab.comdigicatMEnglish · 10 hours agomessage-square0linkfedilink
digicatMEnglish · 10 hours agokafel: A language and library for specifying syscall filtering policies.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkkafel: A language and library for specifying syscall filtering policies.plus-squaregithub.comdigicatMEnglish · 10 hours agomessage-square0linkfedilink