cyb3rint3l

cyb3rint3l

@cyb3rint3l.bsky.social

๐Ÿ›ก๏ธ Making cybersecurity engaging, accessible and fun.

184 Followers 381 Following 258 Posts Joined Nov 2024
1 month ago
Dashboard view of the Windows Server Security Audit tool showing NIS2 alignment grade, critical issues, warnings, passed checks, total checks, and compliance by security domain with color-coded bars.

I've released an open-source PowerShell tool for Windows Server Security Audits.

Features

โœ… Alignment with EUs NIS2 (Art. 21)
โœ… Maps to MITRE ATT&CK & CIS v8
โœ… Weighted Risk Scoring & HTML/JSON Reports

I'd love to have your feedback!

๐Ÿ”— https:https://github.com/cyb3rint3l-labs/ServerSecurityAudit

3 1 0 0
4 months ago
YouTube
โš ๏ธ OPT OUT from LinkedIn's Change That Will Use Your Data for AI Training YouTube video by cyb3rint3l

๐—Ÿ๐—ฎ๐˜€๐˜ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ ๐˜๐—ผ ๐˜๐˜‚๐—ฟ๐—ป ๐—ถ๐˜ ๐—ผ๐—ณ๐—ณ!

#linkedin #aitraining #dataprotection

youtube.com/shorts/CQ-Pd...

1 0 0 0
5 months ago

๐Ÿ“Œ What youโ€™ll learn in this video:

- How to use Process Monitor for real-time file, registry, and process activity

- How to leverage Autoruns to detect malware persistence and TCPView for network connections

- How to combine these tools to get actionable Threat Intelligence

1 0 0 0
5 months ago
YouTube
Threat Hunting with Sysinternals โ€“ Learn Live Windows Forensics (ProcMon, Autoruns, TCPView) YouTube video by cyb3rint3l

In this second part of the "Threat Hunting with Sysinternals" series, designed for SOC Analysts, Blue Teamers and System/Network administrators, we explore Process Monitor, Autoruns and TCPView.

youtu.be/VgWSUKVUUfU

1 0 1 0
6 months ago
Post image

Largest NPM supply chain attack in history. Attackers compromised 18 core JavaScript packages with 2+ billion weekly downloads after phishing a maintainer. Malware targets crypto wallets & steals credentials. Millions of developers affected worldwide www.aikido.dev/blog/npm-deb...

23 14 2 2
6 months ago
Post image

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/7

64 44 2 14
6 months ago
Post image

The new Bloodhound version has some genuinely crazy cool new features -- OpenGraph really blows the doors off the potential for Bloodhound to not just map attack paths within Microsoft Active Directory or Entra ID tenants, but now... ANYTHING ๐Ÿคฉ youtu.be/kVOjXGbm_Ro

8 2 1 0
6 months ago
Post image Post image Post image Post image

SpiderFoot is one of the tools I've used most in my OSINT journey so far.

I highly recommend it!

#osint #cyb3rint3l #cybersecurity #osintseries #digitalfootprint #infosec #spiderfoot #reconnaissance #shodan #virustotal

3 0 0 0
7 months ago
CISA openโ€sources Thorium malware forensic platform In a bid to aid cyber defenders, CISA has released Thoriumโ€”a free, openโ€source malware forensic analysis platform. Designed to streamline the integration of automated threat investigation tools, the platform aims to ease the strain on security teams tackling an ever-increasing volume ofโ€ฆ

CISA openโ€sources Thorium malware forensic platform.
https://deadstack.net/cluster/11364
๐Ÿ”—๐Ÿ”ฅ Stories follow in replies.
#tech #opensource #infosec #government #cybersecurity

2 1 0 0
7 months ago
Preview
US woman jailed for stealing identities to give North Koreans jobs Over $17m raised from the scheme was sent directly to North Korea's nuclear programme, US officials say.

That's...wild!

www.bbc.com/news/article...

1 0 0 0
7 months ago

No six-figure #cybersecurity solution will save you if:

โŒ You haven't trained your users
โŒ You save RDP credentials on the client
โŒ Force UNC paths to remember login details
โŒ You lack a Patch Management strategy
โŒ You are not incorporating Monitoring
โŒ You assume you are too small to be hit

1 0 0 0
8 months ago

LOL

0 0 0 0
8 months ago

Thanks!

0 0 0 0
8 months ago

Lovely!

1 0 0 0
8 months ago

โœ…Learn practical skills to uncover hidden threats, analyse suspicious processes & understand how processes work and behave behind the scenes.

You will also discover how to preserve critical forensic evidence and learn to easily obtain file hashes in both Windows and Linux through the command line.

0 0 0 0
8 months ago
Post image Post image

๐ŸŽฌ How can we analyse a Windows system for malware while making sure to preserve crucial forensic evidence?

Join me in the 1st part of this three-part Threat Hunting series, where I delve into Process Explorer, showing how we can further expand our DFIR arsenal by fine-tuning this Sysinternals tool.

3 0 1 0
8 months ago
Preview
Reflections of the Israel-Iran Conflict on the Cyber World - SOCRadarยฎ Cyber Intelligence Inc. The Israel-Iran conflict is no exception. With APT groups taking visible roles early, and hacktivist narratives spreading quickly online...

A thorough day-by-day write-up on the ongoing conflict. It is worth reading to understand how cyber operations not only affect but could at times play a decisive role in the course of events.

socradar.io/reflections-...

0 0 0 0
9 months ago

a case study in how rushing innovation without stability (or security) can backfire. For some, it was their first foray into home movies & CD burning.

#VintageTech #Nostalgia #WindowsHistory #ThrowbackTuesday #RetroTech #VintageComputing

0 0 0 0
9 months ago
Post image

๐Ÿ’พ Windows ME (meeehhh...)

Windows Millennium Edition, or ME, arrived in 2000, aiming to bring multimedia & home computing together.

It brought System Restore, digital media support, faster boot times, but also bugs &headaches.

Often criticised as one of MS's weakest releases, ME became (1/2)

0 0 1 0
9 months ago

worms & exploits:

CIH (Chernobyl), ILOVEYOU & Melissa all found a fertile playground.

A milestone that blended reliability with innovation (and some BSODs!). (2/2)

#VintageTech #Nostalgia #WindowsHistory #ThrowbackTuesday #RetroTech #VintageComputing

0 0 0 0
9 months ago
Retail packaging of Microsoft Windows 98 Upgrade edition, featuring the iconic Windows logo with a 'NEW VERSION!' badge. Highlights compatibility with Windows 95, Windows 3.1, Windows for Workgroups, and MS-DOS. Tagline reads 'Works Better, Plays Better' and mentions availability of both CD-ROM and 3.5-inch disk versions.

๐Ÿ” Windows 98: Where the internet and PC became one

Released in 1998, Windows 98 refined the Win 95 experience with better hardware support, the Quick Launch bar & the Active Desktop.

It was the OS where the early web took off, with IE embedded.

But it was also the golden age for viruses (1/2)

1 0 1 0
9 months ago

modern computing era.

For many, it was their first plunge into the digital world, making computing personal, accessible and exciting.

#VintageTech #Nostalgia #WindowsHistory #ThrowbackTuesday #RetroTech #VintageComputing

0 0 0 0
9 months ago
Microsoft Windows 95 CD-ROM Setup Boot Disk, high-density 1.44 MB floppy disk labeled for distribution only with a new PC. The label includes setup instructions for booting from drive A, and copyright dates from 1981 to 1995.

๐Ÿ–ฅ๏ธ Windows 95: The OS that changed it all

Building on the foundation set by Windows 3.1, which introduced many to GUIs, Windows 95 launched in 1995 and took digital innovation to new heights.

With the iconic Start button and Plug-and-Play simplicity, Windows 95 opened the gateway to the (1/2)

0 0 1 0
9 months ago

networking and internet use began to grow.

Still, it was the OS that made many, including me, fall in love with Windows.

#VintageTech #Nostalgia #WindowsHistory #ThrowbackSaturday #RetroTech #VintageComputing

0 0 0 0
9 months ago
Microsoft Windows installation CD-ROM from July 1992, labeled 'International Versions' including 3.1 Western European, 3.1 Hebrew and Arabic, and 3.0 Far East Editions. Features the classic Windows logo and 'Not for Resale' notice.

๐Ÿ’ฝ There came Windows 3.1

Arriving in 1992, Windows 3.1 introduced millions to the world of GUIs with its polished look, iconic Program Manager, TrueType fonts and... Minesweeper!๐Ÿ’ฃ

It made computing colourful, structured, and... fun.

But it also saw early vulnerabilities emerge as (1/2)

0 0 1 0
9 months ago

with multitasking.

From Word to Excel, Windows 2.0 nudged the world closer to GUI-driven productivity. (2/2)

#VintageTech #Nostalgia #WindowsHistory #ThrowbackTuesday #RetroTech #VintageComputing

2 0 0 0
9 months ago
Three vintage Hewlett-Packard (HP) 5.25-inch floppy disks labeled 'Vectra Microsoft Windows,' including 'Utilities 2,' 'Utilities 1,' and 'Desktop Applications.' The disks, recorded in Singapore in 1987, feature copyright notices from HP and Microsoft.

๐Ÿ—‚๏ธ Then came Windows 2.0

Released in 1987, Windows 2.0 introduced overlapping windows, desktop icons & better graphics support, making the interface more dynamic.

It powered early business applications & famously introduced keyboard shortcuts still used today. For many, it was their 1st time (1/2)

2 0 1 0
9 months ago

Wild.

0 0 0 0
9 months ago

Sure, that goes without saying.

0 0 0 0
9 months ago

Update: It appears some offshore employees supporting Coinbase were bribed to help or ease cybercriminals to perform the attack. Thanks to @dawisco.bsky.social for pointing this out.

0 0 1 0