Thomas Lilja's Avatar

Thomas Lilja

@tuxic.bsky.social

All things Infosec. OT/ICS. Protector of critical infrastructure. Physical security. Locks. Hardware. Need. More. Time.

310 Followers  |  401 Following  |  39 Posts  |  Joined: 26.10.2023  |  1.9469

Latest posts by tuxic.bsky.social on Bluesky

Newcomers to password cracking should learn that in 1991 the 1st well known password cracker @alecmuffett.bsky.social's Crack introduced applying rules & permutations to dictionary words, such as substituting numbers for letters, reversing words, appending digits, & other common user habits. 1/3

05.03.2025 16:43 β€” πŸ‘ 43    πŸ” 16    πŸ’¬ 3    πŸ“Œ 3
Preview
Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions Cyber Decision Diagrams, a free tool designed to help organizations manage complex decisions related to ICS/OT cybersecurity.Β 

Free Diagram Tool Aids Management of Complex ICS/OT Cybersecurity Decisions

22.02.2025 08:12 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
The Ultimate Guide to Sigma Rules Sigma rules are an open-source, platform agnostic format for building high-fidelity detections and engaging in proactive threat hunting so you can mature your security posture and overcome the cyberse...

Leveraging the capabilities of #Sigmarules can help optimize your log management solution for #security detection & response!

Learn about:
❓Why you should use them
πŸ“‚Specific use cases
🦴Anatomy of a Sigma rule
πŸ” Sigma rule event processing for adv. detection capabilities

graylog.org/post/the-ult...

18.02.2025 22:55 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

I’d love one. 😊

17.01.2025 22:25 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Breaking: Cyberhaven Chrome Extension Compromised in Holiday Attack Campaign An attacker successfully phished a Cyberhaven employee, gained access to Chrome Web Store admin credentials, published a malicious version of the extension

An attacker successfully phished a Cyberhaven employee.

They gained access to their Chrome Web Store admin credentials and published a malicious version of the Cyberhaven extension.

Read my full writeup here:

www.vulnu.com/p/breaking-c...

Thanks @jaimeblascob.bsky.social and @johntuckner.me

27.12.2024 03:20 β€” πŸ‘ 40    πŸ” 17    πŸ’¬ 0    πŸ“Œ 0
motivational poster that says "there is no AI in TEAM"

motivational poster that says "there is no AI in TEAM"

I'm going to revolutionize the motivational industry

21.12.2024 17:36 β€” πŸ‘ 95    πŸ” 21    πŸ’¬ 7    πŸ“Œ 3

PSA: upgrade your FortiOS devices, they’re hiding a zero day again.

21.12.2024 00:06 β€” πŸ‘ 37    πŸ” 13    πŸ’¬ 7    πŸ“Œ 2
Preview
US Water Facilities Urged to Secure Access to Internet-Exposed HMIs EPA and CISA urge organizations in the water and wastewater systems sector to harden remote access to internet-exposed HMIs.

US Water Facilities Urged to Secure Access to Internet-Exposed HMIs

20.12.2024 05:42 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
New Attacks Exploit VSCode Extensions and npm Packages Malicious campaigns targeting VSCode extensions have recently expanding to npm, risking software supply chains

New Attacks Exploit VSCode Extensions and npm Packages

20.12.2024 08:42 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

So you want to be a SOC analyst?

Well, then this is for you…

15.12.2024 22:36 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Seeing as many security programs evaluate their coverage against Mitre Att&ck, it’s interesting to see the same being done for the products they rely on.

15.12.2024 21:34 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

πŸ™„

15.12.2024 15:33 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

πŸ“’ ⬇️

09.12.2024 17:23 β€” πŸ‘ 816    πŸ” 496    πŸ’¬ 3    πŸ“Œ 8

Impressive indeed. But would it be enough to make Windows search usable? πŸ€”

09.12.2024 18:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

This is brilliant! πŸ˜¬πŸ›¬

07.12.2024 14:23 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

I have been informed by my immigration firm I need to rapidly overcome burnout and depression and publish, publish, publish, knocked out a 15 page academic white paper yesterday and 8 page one today. If your publication needs something on industrial cybersecurity… πŸ™πŸ’œ

06.12.2024 22:37 β€” πŸ‘ 166    πŸ” 28    πŸ’¬ 10    πŸ“Œ 1
Preview
NIST issues updated cyber guides focused on assessments and communication Two new volumes were released by the National Institute of Standards and Technology that aim to broaden the publication’s applicability to organizations outside federal agencies.

NIST issues updated cyber guides focused on assessments and communication https://www.nextgov.com/cybersecurity/2024/12/nist-issues-updated-cyber-guides-focused-assessments-and-communication/401410/

07.12.2024 06:12 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

We dodged the bullet once more. For the love of god why won’t they give up this madness.

06.12.2024 22:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Anyone here in ICS, OT, SCADA security that I missed and need to add?

06.12.2024 18:19 β€” πŸ‘ 8    πŸ” 7    πŸ’¬ 1    πŸ“Œ 0
Preview
Internet Archive | Manager - Patron Services The Internet Archive is looking for an outstanding individual to lead our Patron Services team. The Patron Services team operates similarly to customer service, quality assurance, trust and safety or ...

Ever wanted to help advance the Internet Archive's mission of "Universal Access to All Knowledge"?

We are hiring the manager of our Patron Services team.

For more information please see this job listing ‡️
app.trinethire.com/companies/32...

06.12.2024 21:04 β€” πŸ‘ 716    πŸ” 185    πŸ’¬ 3    πŸ“Œ 2
Preview
Destructive Malware: Threat Detection and Incident Response Destructive malware makes systems, devices, and data unusuable to interrupt operations. With appropriate threat detection and incident response, organizations can mitigate destructive malware's impact...

Are you prepared to combat destructive #malware? ☠️⚠️

Trojans, worms, #ransomware & #botnets are all types of destructive malware that can wreck havoc on your systems. 😰

Learn about the motivations behind deploying it, how it works, & how #TDIR can help. πŸ›‘οΈ

graylog.org/post/destruc... #cybersecurity

06.12.2024 21:09 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Finding out is the gravity of the fucking around universe. There’s just no fighting it.

06.12.2024 22:15 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Watch out for rogue browser extensions synced to your enterprise devices by compromised personal accounts. πŸ”₯

06.12.2024 22:08 β€” πŸ‘ 60    πŸ” 15    πŸ’¬ 0    πŸ“Œ 0
Preview
a man in a leather jacket is riding a motorcycle ALT: a man in a leather jacket is riding a motorcycle

And so it begins…

06.12.2024 21:57 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

So, you disappeared Elite James Bond number of messages? 😬

06.12.2024 21:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Ever found yourself needing to decompress Windows 10/11 swap but lacked proper tooling?

If so, this is for you…

06.12.2024 21:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

DDoSecrets has released Library of Leaks, an online database of millions of hacked and leaked documents

search.libraryofleaks.org

05.12.2024 17:05 β€” πŸ‘ 98    πŸ” 33    πŸ’¬ 3    πŸ“Œ 3
Preview
EDR Silencers and Beyond: Exploring Methods to Block EDR Communication - Part 1 For red teams and adversary alike it’s important to stay hidden. As many companies nowadays have EDR agents deployed those agents are always in focus and tools like EDRSilencer or EDRSandblast use…

πŸ›‘οΈWindows Firewall and WFP are only two ways to silence an #EDR agent.
πŸ“’In my latest blog post I discuss another network based technique to prevent data ingest and ways to detect it.

And if you want even more, checkout part 2 released by @Cyb3rMonk Link in the post

01.12.2024 15:04 β€” πŸ‘ 21    πŸ” 10    πŸ’¬ 0    πŸ“Œ 0
Preview
EDR Silencer and Beyond: Exploring Methods to Block EDR Communicationβ€Š-β€ŠPartΒ 2 Alternative methods for EDR Silencers for blocking EDR communication to disable defenses.

[NEW BLOG]
EDR Silencer and Beyond: Exploring Methods to Block EDR Communication - Part 2

In collaboration with
@fabian.bader.cloud


academy.bluraven.io/blog/edr-sil...

#redteam

01.12.2024 17:32 β€” πŸ‘ 16    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0

@tuxic is following 20 prominent accounts