digicatMEnglish · 3 days agoCTO at NCSC Summary: week ending February 8thplus-squarepinctoatncsc.substack.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCTO at NCSC Summary: week ending February 8thplus-squarepinctoatncsc.substack.comdigicatMEnglish · 3 days agomessage-square0linkfedilink
digicatMEnglish · 7 minutes agoActive Ivanti Exploitation Traced to Single Bulletproof IP—Published IOC Lists Point Elsewhereplus-squarewww.greynoise.ioexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkActive Ivanti Exploitation Traced to Single Bulletproof IP—Published IOC Lists Point Elsewhereplus-squarewww.greynoise.iodigicatMEnglish · 7 minutes agomessage-square0linkfedilink
digicatMEnglish · 6 hours agoVoidLink: Dissecting an AI-Generated C2 Implantplus-squarewww.ontinue.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkVoidLink: Dissecting an AI-Generated C2 Implantplus-squarewww.ontinue.comdigicatMEnglish · 6 hours agomessage-square0linkfedilink
digicatMEnglish · 6 hours agoImproving your response to vulnerability managementplus-squarewww.ncsc.gov.ukexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkImproving your response to vulnerability managementplus-squarewww.ncsc.gov.ukdigicatMEnglish · 6 hours agomessage-square0linkfedilink
digicatMEnglish · 15 hours agoSleeper Shells: How Attackers Are Planting Dormant Backdoors in Ivanti EPMMplus-squaredefusedcyber.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSleeper Shells: How Attackers Are Planting Dormant Backdoors in Ivanti EPMMplus-squaredefusedcyber.comdigicatMEnglish · 15 hours agomessage-square0linkfedilink
digicatMEnglish · 15 hours agoUNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineeringplus-squarecloud.google.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineeringplus-squarecloud.google.comdigicatMEnglish · 15 hours agomessage-square0linkfedilink
digicatMEnglish · 15 hours agoAnalysis of active exploitation of SolarWinds Web Help Deskplus-squarewww.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkAnalysis of active exploitation of SolarWinds Web Help Deskplus-squarewww.microsoft.comdigicatMEnglish · 15 hours agomessage-square0linkfedilink
digicatMEnglish · 1 day agoLargest Multi-Agency Cyber Operation Mounted to Counter Threat Posed by Advanced Persistent Threat (APT) Actor UNC3886 to Singapore’s Telecommunications Sectorplus-squarewww.csa.gov.sgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLargest Multi-Agency Cyber Operation Mounted to Counter Threat Posed by Advanced Persistent Threat (APT) Actor UNC3886 to Singapore’s Telecommunications Sectorplus-squarewww.csa.gov.sgdigicatMEnglish · 1 day agomessage-square0linkfedilink
digicatMEnglish · 2 days agoMalicious Bing Ads Lead to Widespread Azure Tech Support Scamsplus-squarewww.netskope.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkMalicious Bing Ads Lead to Widespread Azure Tech Support Scamsplus-squarewww.netskope.comdigicatMEnglish · 2 days agomessage-square0linkfedilink
digicatMEnglish · 2 days agoDKIM replay attacks: Apple and PayPal invoice abuse - summary: ability to set a variable to inject a scam message into a DKIM signed message for later reuseplus-squarewww.kaseya.comexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkDKIM replay attacks: Apple and PayPal invoice abuse - summary: ability to set a variable to inject a scam message into a DKIM signed message for later reuseplus-squarewww.kaseya.comdigicatMEnglish · 2 days agomessage-square0linkfedilink
digicatMEnglish · 2 days agoSQLi in administrative interface - FortiClientEMS 7.4plus-squarewww.fortiguard.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSQLi in administrative interface - FortiClientEMS 7.4plus-squarewww.fortiguard.comdigicatMEnglish · 2 days agomessage-square0linkfedilink
digicatMEnglish · 2 days agowardgate: Give AI agents API access without giving them your credentials. Reduce the blast radius!plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down11
arrow-up13arrow-down1external-linkwardgate: Give AI agents API access without giving them your credentials. Reduce the blast radius!plus-squaregithub.comdigicatMEnglish · 2 days agomessage-square0linkfedilink
digicatMEnglish · 2 days agoCommission responds to cyber-attack on its central mobile infrastructureplus-squareec.europa.euexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkCommission responds to cyber-attack on its central mobile infrastructureplus-squareec.europa.eudigicatMEnglish · 2 days agomessage-square0linkfedilink
digicatMEnglish · 2 days agoBreaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Securityplus-squarehetmehta.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBreaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Securityplus-squarehetmehta.comdigicatMEnglish · 2 days agomessage-square0linkfedilink
digicatMEnglish · 3 days agoThe RCE that AMD won't fix - they store their update URL in the program’s app.config, although its a little odd that they use their “Develpment” URL in production,plus-squareweb.archive.orgexternal-linkmessage-square0linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkThe RCE that AMD won't fix - they store their update URL in the program’s app.config, although its a little odd that they use their “Develpment” URL in production,plus-squareweb.archive.orgdigicatMEnglish · 3 days agomessage-square0linkfedilink
digicatMEnglish · 2 days agoFOSDEM 2026 - A Modern Look at Secure Bootplus-squarefosdem.orgexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkFOSDEM 2026 - A Modern Look at Secure Bootplus-squarefosdem.orgdigicatMEnglish · 2 days agomessage-square0linkfedilink
digicatMEnglish · 3 days agoNearly 5 Million Web Servers Found Exposing Git Metadata – Study Reveals Widespread Risk of Code and Credential Leaksplus-squarewww.mysteriumvpn.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkNearly 5 Million Web Servers Found Exposing Git Metadata – Study Reveals Widespread Risk of Code and Credential Leaksplus-squarewww.mysteriumvpn.comdigicatMEnglish · 3 days agomessage-square0linkfedilink
digicatMEnglish · 3 days agoSecure Boot playbook for certificates expiring in 2026plus-squaretechcommunity.microsoft.comexternal-linkmessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkSecure Boot playbook for certificates expiring in 2026plus-squaretechcommunity.microsoft.comdigicatMEnglish · 3 days agomessage-square1linkfedilink
digicatMEnglish · 3 days agoPeacock: UEFI Firmware Runtime Observability Layer for Detection and Responseplus-squarearxiv.orgexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkPeacock: UEFI Firmware Runtime Observability Layer for Detection and Responseplus-squarearxiv.orgdigicatMEnglish · 3 days agomessage-square0linkfedilink
digicatMEnglish · 3 days agoMANSPIDER: Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkMANSPIDER: Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!plus-squaregithub.comdigicatMEnglish · 3 days agomessage-square0linkfedilink