@ftrsec.bsky.social
βββ(ftrsecγΏkali)-[/opt/bluesky] ββ# cat bsky_desc.txt #Cybersecurity Sr. SOC analyst & builder #Redteam lecturer at university #Splunk expert I love pandas
Splunk 10 Released :)
help.splunk.com/en/splunk-en...
help.splunk.com/en/splunk-en...
An interesting detailed article about an advanced attack and the TTP used
securelist.com/apt41-in-afr...
#Detection #malware #IoC #Cybersecurity
Investigation on Xbash malware
www.trustwave.com/en-us/resour...
Webshell through IIS
www.trendmicro.com/en_us/resear...
Happy new year ! Wish you all the best for the 2025 year !
I'm back to activity after a quick break, starting by sharing an interesting article about EAGERBEE backdoor.
securelist.com/eagerbee-bac...
#Cybersecurity #IoC #malware #infosec
#pwsh tip of the day!
$PSBoundParameters doesn't account for params whom have a default value. Thankfully, you can still get this information! Enter $PSCmdlet! You can pull the bound parameters off of the Invocation Property of that object.
I put together a quick example at:
Happy Scripting!
apkleaks: Scanning APK file for URIs, endpoints & secrets meterpreter.org/apkleaks-sca...
07.01.2025 04:57 β π 3 π 1 π¬ 0 π 0Adding to my ETW research toolkit, a tiny program to consume information from a provider with as little overhead as possible.
PockETWatcher, a tool to get the essential information from a ETW provider to the CLI or a JSON file
github.com/olafhartong/...
Merry Christmas to everyone! π₯³
Big respect to those in cyber holding the fort today ! Thank you !
Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware
gbhackers.com/skuld-malwar...
#Infosec #Security #Cybersecurity #CeptBiro #Skuld #Malware #WindowsUtilitiesPackages #Malware
π GenAI x Sec Advent #21
What happens when attackers compromise your GenAI system? Let's talk about LLM Hijacking π
π§ LLM Hijacking is an attack where a threat actor gains unauthorized access to your LLM cloud resources and exploits them for their own [β¦]
[Original post on infosec.exchange]
And yet another supply chain attack
socket.dev/blog/rspack-...
#cybersecurity #infosec #malware
TrendMicro analysis on python-based nodestealer.
I remind you that using the Startup folder to establish persistence is a common method used by attackers.
www.trendmicro.com/en_us/resear...
#infosec #cybersecurity #malware
For all the wazuh lovers, a small article to make detection on deerstealer with sysmon
wazuh.com/blog/detecti...