Lystena

Lystena

@lystena.bsky.social

team red -> team blue connoisseur of "how hard is it really?" consequences

80 Followers 346 Following 18 Posts Joined Jul 2023
8 months ago
Preview
Announcing comprehensive sovereign solutions empowering European organizations - The Official Microsoft Blog Today, we are taking the next step in strengthening our European Digital Commitments to empower our customers with greater choice, more control over their data privacy and the most robust digital resi...

Microsoft is now selling SaaS without the aaS

blogs.microsoft.com/blog/2025/06...

10 3 4 1
10 months ago
Chris Krebs (CISA) has a posse
1 0 0 0
11 months ago

I mean did it and was it actually thought to/meant to "help"? Because wowee its terrible

0 0 0 0
11 months ago
20 6 0 1
1 year ago

Someone from India has been doing mass downloads from our virus exchange (in the millions)

1. My dude — we allow bulk downloads from our main website.
2. Don't make us impose API limitations

40 3 0 0
1 year ago
Preview
Use one Virtual Machine to own them all — active exploitation of ESXicape A chain of three zero days allow threat actors to escape a Virtual Machine.

Update your VMware ESX farms ASAP.

There's an in the wild exploit chain being used which does VM -> Hypervisor escape, across all versions of ESXi. Allows full cluster access.

doublepulsar.com/use-one-virt...

59 29 3 2
1 year ago

I feel like this gives you a mandate to glue a Mercedes badge to your bin.

1 0 0 0
1 year ago

Man that's terrible news. Dfj was a great person and a great part of the community.

6 0 0 0
1 year ago
Kirkjufell, Iceland

Reminds me of visiting Kirkjufell in Iceland, just on a completely different size scale 😅

Good luck with the research

0 0 1 0
1 year ago
Clipping the Canary’s wings: Bypassing AiTM Phishing Detections | Spotit insights

Defenders use cross-origin requests through CSS url() or injected JS to leak your phishing URL in the HTTP Referer header.

Today, I've been reminded about the excellent post by Keanu Nys, which contains a lot of great evasion ideas!

insights.spotit.be/2024/06/03/c...

13 3 0 0
1 year ago

Oh, I never posted my gotofail story on here.

Early 2014, someone came to me about a catastrophic vulnerability in Apple's TLS implementation.

I shit you not, they'd overheard someone at a bar drunkenly bragging about how they were going to sell it to a FVEY intelligence agency for six figures.

458 101 7 20
1 year ago

Thanks for putting these together. Always looking for more MDE/MDI and general detection engineering folk to follow.

1 0 0 0
1 year ago

#DEATHCON24 has been great and what looks to be still a bunch of great content to go through.

Enjoyed the format!

1 0 0 0
1 year ago

Unlucky that discord is seeming to be having a bit of an outage during #DEATHCON24

0 0 0 0
1 year ago
Post image Post image Post image
0 0 0 0
1 year ago
1 0 1 0
1 year ago

I used to love "old Twitter" for the somewhat centralised infosec content and the high signal to noise ratio of valuable content I had been able to curate in my follows. It was notoriously good at providing just the right blog article for someone's engagement that week. I hope it returns here

1 0 0 0
1 year ago

You're damn right it is. What is this thread; where does it lead to; who put it there; why does it work like that; why do they want that...

Often benign outcomes. Until it isn't.

0 0 0 0
2 years ago

Brisbane was 17°C overnight last night ..

0 0 0 0
2 years ago
Post image

After today we were a tad doubtful

1 0 0 0
2 years ago
Post image

Definitely big "I just got here, is it me?" vibes

0 0 0 0
2 years ago

My reputation is now fast becoming "oh your the person who just makes the executive sad or uncomfortable about risks introduced by hard problems I'm trying my best to avoid thinking about"

1 0 0 0
2 years ago

Document names are kind of like job titles. There are internal and external document names. For example, the external document title is “Risk Register”, but the internal title is “Wish List”.

5 4 1 0
2 years ago

Hi, you can call me lystena. I used to do offensive security, find weird bugs, and annoy blue teamers. Then I joined the blue team, wrote weird alerts and automation to annoy red teamers. Now somehow I'm management, I make PowerPoints and I annoy everyone. 🤷‍♂️

4 0 1 0
2 years ago

Sup sup. How's things?

0 0 0 0