Bas's Avatar

Bas

@bastradamus.bsky.social

Passionate about Security operations, Cloud & Detection Engineering.

11 Followers  |  36 Following  |  8 Posts  |  Joined: 20.07.2023  |  1.6112

Latest posts by bastradamus.bsky.social on Bluesky

Preview
Detecting WinRAR zero-day exploitation: CVE-2025–8088 Detecting CVE-2025–8088 post-exploitation attempts with Defender XDR via KQL.

Detecting WinRAR zero-day post-exploitation attempts:

bastradamus.com/detecting-wi...

12.08.2025 18:56 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - NCSC-NL/citrix-2025 Contribute to NCSC-NL/citrix-2025 development by creating an account on GitHub.

The Dutch cybersecurity agency has released a script to detect webshells typically installed by attackers exploiting the CitrixBleed2 vulnerability in Citrix NetScaler appliances

github.com/NCSC-NL/citr...

27.07.2025 14:18 β€” πŸ‘ 24    πŸ” 11    πŸ’¬ 1    πŸ“Œ 0
Preview
Detecting device code phishing in Google Security Operations Creating a YARA-L detection rule for device code phishing attacks.

Detecting device code phishing attacks in Google Security Operations

bastradamus.com/detecting-de...

23.05.2025 05:15 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Incident Response in Microsoft Entra ID (formerly Azure AD) Compromised user account edition.

Incident Response in Microsoft Entra ID (formerly Azure AD) bastradamus.com/incident-res...

08.05.2025 19:38 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Azure & Entra ID token manipulation Access tokens + Refresh tokens edition

Azure & Microsoft Entra ID token manipulation bastradamus.com/azure-entra-...

31.03.2025 17:32 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice | Proofpoint US Key findingsΒ Β Β  More threat actors are using legitimate remote monitoring and management (RMM) tools as a first-stage payload in email campaigns.Β  RMMs can be used for

Published some new research on how RMMs are taking over as a first-stage payload www.proofpoint.com/us/blog/thre...

11.03.2025 15:24 β€” πŸ‘ 34    πŸ” 16    πŸ’¬ 0    πŸ“Œ 0
Preview
Confluence Exploit Leads to LockBit Ransomware Key Takeaways The intrusion began with the exploitation of CVE-2023-22527 on an exposed Windows Confluence server, ultimately leading to the deployment of LockBit ransomware across the environment.…

It took just 3 hours:

RCE β†’ Metasploit C2 β†’ Anydesk for remote GUI-access β†’ LockBit ransomware

Interestingly, we observed the threat actor using PDQ Deploy, a patch management tool.

Read the report here:

24.02.2025 15:25 β€” πŸ‘ 9    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0
Preview
Det. Eng. Weekly #93 - Does a tangodown 3-peat count after a week off? I take a week off publishing and a ransomware operator gets arrested, coincidence?

Mentioned in #93 of the detection engineering weekly edition πŸ™

www.detectionengineering.net/p/det-eng-we...

01.03.2025 07:26 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

1/ Among one of the techniques to detect infections as laid out in my presentation and additional blog post "N-IOCs to Rule Them All" [1], is tracking lookups to Dynamic DNS (DynDNS) domains and providers.

28.02.2025 07:27 β€” πŸ‘ 1    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Preview
Google SecOps Detection Rule Wiki Comprehensive collection of Google SecOps YARA-L detection rules for security operations.

secops.wiki is live, it let's you search and filter community detection rules for Google SecOps (formerly known as Google Chronicle). Also has a Yara-L rule builder & some additional resources. Work in progress.

28.02.2025 21:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Very much appreciate @techy.detectionengineering.net mentioning the 2 part series πŸ™

28.02.2025 21:25 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How to create a Detection Engineering Labβ€Šβ€”β€ŠPart 1 Setting up a Lab lets you mimic real-world TTPs in a safe environment, making it easy to test, build and fine-tune detection logic.

Rather recently, I finally found time to start writing security-focused blogs. I’ll try sharing content regularly, let’s start with my two part series on creating a Detection engineering testing environment:

1. medium.com/@bastradamus...

2. medium.com/@bastradamus...

28.02.2025 21:14 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@bastradamus is following 19 prominent accounts