Essential Client-Side Vulnerabilities that Every Pentester Should Know:
hacklido.com/blog/1117-es...
@andranglin.bsky.social
Cybersecurity Enthusiast | Cloud & On-Prem Security Operations | Threat Hunting | DFIR Skilled in threat detection & response, with a drive for ongoing skill growth. Website: https://rootguard.git
Essential Client-Side Vulnerabilities that Every Pentester Should Know:
hacklido.com/blog/1117-es...
OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals
any.run/cybersecurit...
How Adversary Telegram Bots Help to Reveal Threats: Case Study
any.run/cybersecurit...
Cyber Attacks on Government Agencies: Detect and Investigate with ANY.RUN for Fast Response
any.run/cybersecurit...
How MSSPs Can Analyze and Investigate Phishing Attacks with ANY.RUN
any.run/cybersecurit...
Building a Cyberthreat-Resilient Organization
info.microsoft.com/ww-thankyou-...
SOC Investigations 2025: Clues Are Key
www.cybertriage.com/blog/soc-inv...
Windows Registry Forensics Cheat Sheet 2025
www.cybertriage.com/blog/windows...
PHP Type Juggling Explained: The Silent Security Risk Lurking in Web Applications
hacklido.com/blog/1107-ph...
Introduction to Threat Intelligence ETW
undev.ninja/introduction...
The Bitter End: Unraveling Eight Years of Espionage AnticsβPart One
www.proofpoint.com/us/blog/thre...
Newly identified wiper malware βPathWiperβ targets critical infrastructure in Ukraine
blog.talosintelligence.com/pathwiper-ta...
Fake WordPress Caching Plugin Used to Steal Admin Credentials
blog.sucuri.net/2025/06/fake...
Spear Phishing in Armenia: Inside a Persistent Campaign by UNC5792
cyberhub.am/en/blog/2025...
SCIM Hunting - Beyond SSO
blog.doyensec.com/2025/05/08/s...
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign
censys.com/blog/trackin...
LOLCLOUD - Azure Arc - C2aaS
Exploring Azure Arcβs overlooked C2aaS potential. Attacking and Defending against its usage and exploring usecases.
blog.zsec.uk/azure-arc-c2...
Text-to-Malware: How Cybercriminals Weaponize Fake AI-Themed Websites
cloud.google.com/blog/topics/...
NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign
www.rapid7.com/blog/post/20...
DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt
unit42.paloaltonetworks.com/darkcloud-st...
Implementing SIEM and SOAR platforms
www.cyber.gov.au/resources-bu...
Earth Lamia Develops Custom Arsenal to Target Multiple Industries
www.trendmicro.com/en_us/resear...
Jigsaw RDPuzzle: Piecing Attacker Actions Together
insinuator.net/2025/01/jigs...
One Tool To Rule Them All
shells.systems/one-tool-to-...
Trend Microβ’ Managed XDR Analysis of Infection From Fake Installers and Cracks
www.trendmicro.com/en_us/resear...
Dissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attack
www.kandji.io/blog/macos-a...
Mapping MITRE ATT&CK with Window Event Log IDs
www.socinvestigation.com/mapping-mitr...
China-Nexus Threat Actor Actively Exploiting Ivanti Endpoint Manager Mobile (CVE-2025-4428) Vulnerability
blog.eclecticiq.com/china-nexus-...
BadUSB Attack Explained: From Principles to Practice and Defense
insbug.medium.com/badusb-attac...
Offensive Threat Intelligence
blog.zsec.uk/offensive-cti/