Security First as Microsoft lies you! Mind blowing vulnerability in a functionality intentionally developed by Microsoft enabled compromise to all Azure tenants! dirkjanm.io/obtaining-gl...
18.09.2025 04:56 β π 0 π 0 π¬ 0 π 0@dudeonsecurity.bsky.social
Black hat hunter.
Security First as Microsoft lies you! Mind blowing vulnerability in a functionality intentionally developed by Microsoft enabled compromise to all Azure tenants! dirkjanm.io/obtaining-gl...
18.09.2025 04:56 β π 0 π 0 π¬ 0 π 0It's time to secure your software supply chain. Popular npm packages with 20 billion weekly downloads have been compromised, and this isn't a single incident. thehackernews.com/2025/09/20-p...
13.09.2025 05:51 β π 1 π 0 π¬ 0 π 0Sometimes we need something else than just firewall rules. Way to go!
www.europol.europa.eu/media-press/...
The attack is likely being carried out by a nation-state or another well-resourced threat actor, according to researchers.
29.05.2025 16:59 β π 89 π 55 π¬ 2 π 7Russian influence in the USA is intensifying. therecord.media/hegseth-orde...
03.03.2025 05:40 β π 0 π 0 π¬ 0 π 0Sad to see USA is now a state of Russia. #ukraine
28.02.2025 18:46 β π 0 π 0 π¬ 0 π 0Check your Signal settings for ππ’π§π€ππ πππ―π’πππ¬! cloud.google.com/blog/topics/...
19.02.2025 13:39 β π 0 π 0 π¬ 0 π 0You can diminish simple buffer overflows from your C code. It is possible. It can be automated. Really. #softwaresecurity #cybersecurity www.darkreading.com/vulnerabilit...
13.01.2025 06:02 β π 0 π 0 π¬ 0 π 0If your car is connected, it is being followed: www.bleepingcomputer.com/news/securit...
30.12.2024 09:48 β π 0 π 0 π¬ 0 π 0It seems every possible vendor is celebrating 100% coverage in MITRE ATT&CK evaluations. And each has their fanbase cheering like itβs New Yearβs Eve. Who is lying? Guess we can all retire now. #mitre #mitreatt&ck #cybersecurity
16.12.2024 03:15 β π 0 π 0 π¬ 0 π 0Email phishing: still the king of digital crime. π How long will this reign last? β³ #phishing #cybersecurity #neverlearn
16.12.2024 03:00 β π 0 π 0 π¬ 0 π 0Ivanti keeps on giving (CVSS 10.0). I would seriously consider running these on enterprise or other environments. We should demand more! www.bleepingcomputer.com/news/securit...
11.12.2024 06:21 β π 0 π 0 π¬ 0 π 0Teams is malware (still)! cybersecuritynews.com/red-team-too...
09.12.2024 06:58 β π 0 π 0 π¬ 0 π 0Teams is malware! cybersecuritynews.com/black-basta-...
09.12.2024 06:57 β π 0 π 0 π¬ 0 π 0For the attacker, persistency is the key. For the defender, you have to go deep deep down the rabbit hole to erade the attackers. therecord.media/fbi-cisa-chi...
04.12.2024 04:07 β π 0 π 0 π¬ 0 π 0I agree: βIn modern LLM systems, there is a lot of code between what you type and what the LLM receives, and between what the LLM produces and what you see. All of that code is exploitable, and I expect many more vulnerabilities to be discovered in the coming year.β www.schneier.com/blog/archive...
02.12.2024 07:04 β π 0 π 0 π¬ 0 π 0Google is doing very interesting work on AI-assisted vulnerability research. It's likely that other, less reputable actors are doing so as well. thehackernews.com/2024/11/goog...
29.11.2024 14:59 β π 0 π 0 π¬ 0 π 0Great to see efforts on standardizing Cyber Threat Intel #cti activities in an industry with diverse practices. Take a look at the CTI-CMM maturity model. Are you using any other CTI maturity models? cti-cmm.org
25.11.2024 17:50 β π 0 π 0 π¬ 0 π 0It doesnβt need to be the most critical CVSS 9.8 vulnerability to be exploited. Is your vulnerability management program prioritizing vulnerabilities that can be exploited in your attack paths? thehackernews.com/2024/11/russ...
23.11.2024 05:24 β π 0 π 0 π¬ 0 π 0Where to start? Start from the basics. You do not connect your management interface to public network: thehackernews.com/2024/11/warn...
22.11.2024 23:21 β π 0 π 0 π¬ 0 π 0