digicatMEnglish · 9 hours agoCTO at NCSC Summary: week ending December 14thplus-squarepinctoatncsc.substack.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCTO at NCSC Summary: week ending December 14thplus-squarepinctoatncsc.substack.comdigicatMEnglish · 9 hours agomessage-square0linkfedilink
digicatMEnglish · 17 minutes agoPyStoreRAT: A New AI-Driven Supply Chain Malware Campaign Targeting IT & OSINT Professionalsplus-squarewww.morphisec.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPyStoreRAT: A New AI-Driven Supply Chain Malware Campaign Targeting IT & OSINT Professionalsplus-squarewww.morphisec.comdigicatMEnglish · 17 minutes agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoFake Leonardo DiCaprio Movie Torrent Drops Agent Tesla Through Layered PowerShell Chainplus-squarewww.bitdefender.comexternal-linkmessage-square1linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkFake Leonardo DiCaprio Movie Torrent Drops Agent Tesla Through Layered PowerShell Chainplus-squarewww.bitdefender.comdigicatMEnglish · 7 hours agomessage-square1linkfedilink
digicatMEnglish · 7 hours agophantom-keylogger: Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.plus-squaregithub.comexternal-linkmessage-square1linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkphantom-keylogger: Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.plus-squaregithub.comdigicatMEnglish · 7 hours agomessage-square1linkfedilink
digicatMEnglish · 3 hours agoBlog: Task Injection – Exploiting agency of autonomous AI agentsplus-squarebughunters.google.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlog: Task Injection – Exploiting agency of autonomous AI agentsplus-squarebughunters.google.comdigicatMEnglish · 3 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agounKover: Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkunKover: Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.plus-squaregithub.comdigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoHoly Shuck! Weaponizing NTLM Hashes as a Wordlistplus-squaretrustedsec.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkHoly Shuck! Weaponizing NTLM Hashes as a Wordlistplus-squaretrustedsec.comdigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoOffsetInspect: PowerShell utility to map AV detection offsets in PowerShell scripts to their corresponding line numbers for static analysis and red-team tooling.plus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOffsetInspect: PowerShell utility to map AV detection offsets in PowerShell scripts to their corresponding line numbers for static analysis and red-team tooling.plus-squaregithub.comdigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoSCOMmand and Conquer - Attacking System Center Operations Manager (Part 1)plus-squarespecterops.ioexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSCOMmand and Conquer - Attacking System Center Operations Manager (Part 1)plus-squarespecterops.iodigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoA look at an Android ITW DNG exploitplus-squaregoogleprojectzero.blogspot.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA look at an Android ITW DNG exploitplus-squaregoogleprojectzero.blogspot.comdigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 7 hours agoAPT15 Cyber Espionage: Campaigns and TTPs Analysisplus-squarewww.picussecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAPT15 Cyber Espionage: Campaigns and TTPs Analysisplus-squarewww.picussecurity.comdigicatMEnglish · 7 hours agomessage-square0linkfedilink
digicatMEnglish · 8 hours agoAPT-C-26(Lazarus)组织利用WinRAR漏洞部署Blank Grabber木马的技术分析 - Technical Analysis of APT-C-26 (Lazarus) Group's Deployment of the Blank Grabber Trojan Using a WinRAR Vulnerabilitymp.weixin.qq.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkAPT-C-26(Lazarus)组织利用WinRAR漏洞部署Blank Grabber木马的技术分析 - Technical Analysis of APT-C-26 (Lazarus) Group's Deployment of the Blank Grabber Trojan Using a WinRAR Vulnerabilitymp.weixin.qq.comdigicatMEnglish · 8 hours agomessage-square0linkfedilink
digicatMEnglish · 9 hours agoMultiple Threat Actors Exploit React2Shell (CVE-2025-55182)plus-squarecloud.google.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMultiple Threat Actors Exploit React2Shell (CVE-2025-55182)plus-squarecloud.google.comdigicatMEnglish · 9 hours agomessage-square0linkfedilink
digicatMEnglish · 9 hours agoMeta SECOND - THIRD QUARTER Adversarial Threat Reportscontent-lhr8-2.xx.fbcdn.netexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMeta SECOND - THIRD QUARTER Adversarial Threat Reportscontent-lhr8-2.xx.fbcdn.netdigicatMEnglish · 9 hours agomessage-square0linkfedilink
digicatMEnglish · 22 hours agoThe Fragile Lock: Novel Bypasses For SAML Authenticationplus-squareportswigger.netexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkThe Fragile Lock: Novel Bypasses For SAML Authenticationplus-squareportswigger.netdigicatMEnglish · 22 hours agomessage-square1linkfedilink
digicatMEnglish · 21 hours agoRussian Cyber Army. Who is it? – Molfar Intelligence Instituteplus-squarewww.molfar.instituteexternal-linkmessage-square0linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkRussian Cyber Army. Who is it? – Molfar Intelligence Instituteplus-squarewww.molfar.institutedigicatMEnglish · 21 hours agomessage-square0linkfedilink
digicatMEnglish · 21 hours agoCracking ValleyRAT: From Builder Secrets to Kernel Rootkitsplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCracking ValleyRAT: From Builder Secrets to Kernel Rootkitsplus-squareresearch.checkpoint.comdigicatMEnglish · 21 hours agomessage-square0linkfedilink
digicatMEnglish · 21 hours agoGuidance for Managing UEFI Secure Bootplus-squaremedia.defense.govexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkGuidance for Managing UEFI Secure Bootplus-squaremedia.defense.govdigicatMEnglish · 21 hours agomessage-square0linkfedilink
digicatMEnglish · 21 hours agoUncovering Hidden Forensic Evidence in Windows: The Mystery of AutoLogger-Diagtrack-Listener.etlplus-squarewww.fortinet.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkUncovering Hidden Forensic Evidence in Windows: The Mystery of AutoLogger-Diagtrack-Listener.etlplus-squarewww.fortinet.comdigicatMEnglish · 21 hours agomessage-square0linkfedilink
digicatMEnglish · 21 hours agoStealthMole Intelligence Hub: A Family, Not a Team: Deconstructing Hacktivist of Garuda’s Operational Infrastructureplus-squarestealthmole-intelligence-hub.blogspot.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkStealthMole Intelligence Hub: A Family, Not a Team: Deconstructing Hacktivist of Garuda’s Operational Infrastructureplus-squarestealthmole-intelligence-hub.blogspot.comdigicatMEnglish · 21 hours agomessage-square0linkfedilink