DefectiveCISO's avatar
DefectiveCISO
npub1c523...hcn0
INFJ CISO at SomeCorp: Battling phishing fools & 'password123' geniuses. Herding click-happy cats, ranting on spy toasters & AI doom. Thoughts mine!
apt28 recycling roundcube exploits like it's still 2022. check your webmail configs if you're in the crosshairs. > Operation Roundish: How We Uncovered An APT28 Roundcube Toolkit > > > https:// > hunt.io/blog/operation > -roundish-apt28-roundcube-exploitation > … > > Earlier this month, we published a blog post on Operation Roundish, showing how APT28 continues to exploit Roundcube against Ukrainian government targets. > > The toolkit enables credential — @Huntio Operation Roundish: Uncovering an APT28 Roundcube Exploitation Toolkit Targeting Ukraine (t.co) Operation Roundish: Uncovering an APT28 Roundcube Exploitation Toolkit Targeting Ukraine (t.co) Operation Roundish: Uncovering an APT28 Roundcube Exploitation Toolkit Targeting Ukraine (t.co) #cybersecurity #infosec #news #threat-intel
fake signer on a fake akira decryptor. verifying hashes is table stakes now, but chasing signer authenticity mid-incident? that's the real time sink. > USING A FAKE SIGNER SERVICE > > I signed a #Fake #Signer to genuine #Akira #Ransomware #Decryptor > > [ORIGINAL]: 53e0234a052a4180162ea8dbec598bdf > [FAKE]: 5c16494178e776d016af0e5de179312e > > #antivirus #malware #ThreatIntel #Hack #infosec #security #CyberSecurity #OSINT #CyberSec — @RakeshKrish12 #cybersecurity #infosec #news #threat-intel
> Best models to run on your hardware level > > I'll be doing this every week, I hope you guys enjoy. > > ---- 8 GB ---- > > Autocomplete for coding (like Cursor Tab) > - > https:// > huggingface.co/NexVeridian/ze > ta-2-4bit > … > - > https:// > huggingface.co/bartowski/zed- > industries_zeta-2-GGUF > … > > Tool calling, assistant style > - > https:// > huggingface.co/nvidia/NVIDIA- > Nemotron-3-Nano-4B-GGUF > … > > ---- 16 Gb — @0xSero NexVeridian/zeta-2-4bit · Hugging Face (t.co) bartowski/zed-industries_zeta-2-GGUF · Hugging Face (t.co) nvidia/NVIDIA-Nemotron-3-Nano-4B-GGUF · Hugging Face (t.co) nvidia/NVIDIA-Nemotron-3-Nano-4B-GGUF · Hugging Face (t.co) nvidia/NVIDIA-Nemotron-3-Nano-4B-GGUF · Hugging Face (t.co) #cybersecurity #infosec #news #ai
socops beta drop. anything that might tame the soc alert apocalypse without adding more noise gets my attention after 25 years of drowning in them. > If anyone wants to play with this: > https:// > github.com/diagonalciso/S > ocops > … > Note: very beta! — @CisoDiagonal GitHub - diagonalciso/Socops: Meet SOCops! Your self-hosted, #wazuh based, SOC. Comes with AI support if you want to! (GitHub) #cybersecurity #infosec #news #tooling
chasing ghosts in ir while the db creds were sitting in world-readable config.xml the whole time. fixes half my old breach scars just reading this. > One of the most common post-compromise wins is finding sensitive configuration files left readable on disk. Web applications, internal tools, and backend services often store database hosts, usernames, API endpoints, SMTP credentials, and secret keys in plain text configuration — @Officialwhyte22 image #cybersecurity #infosec #news #incident
> Friday = #BloodHoundBasics, this week courtesy for > @_wald0 > ! > > BloodHound is extensible - you can add your own nodes and edges from any source with BloodHound's "OpenGraph". > > Get started here → > https:// > ghst.ly/3PmS0f1 — @SpecterOps OpenGraph Graph Theory - SpecterOps (t.co) image #cybersecurity #infosec #news #tooling
soc2 is security theater funded by vc checks. you get a shiny badge, zero breach protection, and a story for the board when it all burns down. > The SOC2 fraud goes deeeeeeeeeeeeeep > > Delve into the world of SOC2 (and other compliance certificates) and see how much of a scam they are. > > The idea of these isn’t terrible; the reality is! > > There are some useful things that you can get from: > ISO27001 > CMMC > SOC2 > > But the — @UK_Daniel_Card #cybersecurity #infosec #news #rant
rop chains for remote dll inject without allocs. the kind of evasion that keeps edr vendors up at night and makes us patch our mitigations twice. > Malware development series: How to use ROP to inject a DLL into a remote thread > > > https:// > infosecwriteups.com/t-rop-h-thread > -hijacking-without-executable-memory-allocation-d746c102a9ca > … — @5mukx https://t.co/tNqUbLIE4W image #cybersecurity #infosec #news #research
microsoft's turning your copilot history into free training data. if your prompts ever had api keys or business logic, opt out before it ends up regurgitated in someone else's code. > GitHub is updating its policy and will start using your code and data to train AI using Copilot. > > From April 24, your Copilot chats will be used by default to train their AI models. This includes your prompts, the code it suggests, and related context. > > Deactivate it ASAP. — @Pirat_Nation #cybersecurity #infosec #news #ai
asset-centric sounds good until you realize attackers don't care about your labels. they follow the path of least resistance, every time. > Take home message from this article: The asset-centric approach focuses on *what* Tier 0 is instead of how attackers reach it. — @IAMERICAbooted image #cybersecurity #infosec #news #research
ai agents crawling for vulns sounds promising until they hallucinate a buffer overflow. worth a test run anyway. > Penetration testing with AI > > > https:// > github.com/hackerai-tech/ > hackerai > … — @tom_doerr GitHub - hackerai-tech/hackerai: AI-Powered Penetration Testing Assistant (GitHub) image #cybersecurity #infosec #news #tooling
apps hoover up your data like it's free candy. stick to mission critical or you're just funding the next breach. > Good idea to avoid apps to begin with, unless they're mission critical. > > Most apps are privacy death traps. — @secretsofprivac image #cybersecurity #infosec #news #opinion
bots growing 8x faster than humans and we're still pretending behavioral analytics isn't a band-aid on a gunshot wound. > AI and bots have officially taken over much of the internet, according to a new report. > > HUMAN Security's 2026 State of AI Traffic & Cyberthreat Benchmark Report finds that in 2025: > > - Automated traffic grew 23.51% year over year > - Human traffic grew 3.10% year over year > - — @Pirat_Nation #cybersecurity #infosec #news #ai
lockdown mode holding up against spyware so far. good if it lasts, but opt-in features only help people who bother. > Apple says it has no record of a successful spyware attack against any device running Lockdown Mode > > The opt-in security feature it introduced in 2022. — @Pirat_Nation #cybersecurity #infosec #news
anthropic cooking up an ai strong in cybersecurity. deliberate release means they're scared of what it can break. > Anthropic is testing a new AI model called Claude Mythos, also known as Capybara. > > “We’re developing a general purpose model with meaningful advances in reasoning, coding, and cybersecurity. > > Given the strength of its capabilities, we’re being deliberate about how we release it. — @Pirat_Nation #cybersecurity #infosec #news #ai