Andy Swift's Avatar

Andy Swift

@swiftsecur.bsky.social

Security Researcher and Technical Director of Offensive Security at @6degreesgroup | Red Team | Penetration Testing | Reversing | DFIR | Views are my own.

243 Followers  |  416 Following  |  231 Posts  |  Joined: 13.11.2024  |  1.5116

Latest posts by swiftsecur.bsky.social on Bluesky

Episode 15: Why Can't Pentesters Scope?

@tib3rius.bsky.social & @swiftsecur.bsky.social discuss why they (pentesters) can't scope very well.

Links below!

18.07.2025 14:00 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 1    πŸ“Œ 1

So....I built a new scheduling/resourcing system for pentesters, its been a fun project...but now, the irony....it is being pentested....hold onto your hats people...this is going to be a bumpy ride 🀣

#pentesting

11.07.2025 09:39 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
New Linux Security Flaw Uses Initramfs to Inject Malware A newly found security flaw in Ubuntu could allow attackers with physical access to bypass full disk encryption. Learn how the attack works.

www.omgubuntu.co.uk/2025/07/ubun...

This is kinda interesting, maybe helpful for forensics πŸ˜†

08.07.2025 10:13 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

This has been my fav so far.... @davidkuszmar.com was awesome, we got to have him back. LIGHT THE RIVER ON FIRE!

04.07.2025 14:30 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Episode 14: Ignore Previous Instructions & Interview David Kuszmar

@tib3rius.bsky.social & @swiftsecur.bsky.social interview AI security researcher @davidkuszmar.com about his incredible LLM jailbreaks and exploits!

Links below!

04.07.2025 14:00 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 1    πŸ“Œ 3

I dont really ask people to be references, imo security and privacy are important in our work, yet.. most large bid contracts ask for them, whats funny is the ones asking often decline to be references themselves citing security policy as the reason...vicious cycle.

03.07.2025 05:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

On me way to London guv :) at the Imperial War Museum today for a bit of a workshop with some clients, fun day ahead!

03.07.2025 05:10 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
a woman is making a funny face and says not again ALT: a woman is making a funny face and says not again

thehackernews.com/2025/06/citr...

Uh oh....

26.06.2025 08:23 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Citrix Patches Critical Vulns in NetScaler ADC and Gateway Citrix is recommending its customers upgrade their appliances to mitigate potential exploitation of the vulnerabilities.

www.darkreading.com/vulnerabilit...

ahhh here we go again :) This is giving me serious PTSD, last time out the IR bat signal was on constantly for a good few weeks πŸ˜‚

No evidence of wild exploitation yet apparently...but still.

25.06.2025 08:46 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

"If you need legal consultation regarding your target, simply click the 'Call lawyer' button located within the target interface, and our legal team will contact you privately to provide qualified legal support,"

This is amazing.

23.06.2025 09:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Qilin Ransomware Adds "Call Lawyer" Feature to Pressure Victims for Larger Ransoms Qilin ransomware intensifies, offering legal counsel to affiliates, rising as a top cybercrime platform with 304 victims in 2025.

thehackernews.com/2025/06/qili...

lol wtf is this.... 🀣

23.06.2025 09:10 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

I've always found it works best not to use non-existent settings..

23.06.2025 08:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Episode 13: US Tech Market Dominance

@tib3rius.bsky.social & @swiftsecur.bsky.social chat about why the US tech and cybersecurity markets are so dominant in the world. Prepare for some hot takes. πŸ”₯πŸ₯΅

Links below!

20.06.2025 16:00 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0
Preview
Critical Linux Privilege Escalation Vulnerabilities Let Attackers Gain Full Root Access Two critical, interconnected flaws, CVE-2025-6018 and CVE-2025-6019, enable unprivileged attackers to achieve root access on major Linux distributions.

cybersecuritynews.com/linux-privil...

Few big ones for Linux...one is all Suse but the other is a lil more interesting LPE.

18.06.2025 09:24 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

uh huh πŸ‘

16.06.2025 10:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data Malware-laced PyPI and npm packages steal developer credentials, CI/CD data, and crypto wallets. Attacks target macOS, AI workflows, and cloud setups

Ah ha! looks like these are doing the rounds again :D

Careful pulling in packages..as more people are now coding via the vibes...I wonder if we will see more of this type of thing..

thehackernews.com/2025/06/mali...

16.06.2025 09:35 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The Risks of Pre-Windows 2000 Compatibility Access The default setting of many modern Windows servers can create a vulnerability around pre-Windows 2000 compatibility access. Visit our AD blog to learn more.

For Reference:

www.semperis.com/blog/securit...

'This option was available in the earlier OS when promoting a new AD forest. If you had indeed chosen this option a few years ago, you would even have added Anonymous Users and Everyone to the Pre-Windows 2000 Compatible Access group'

13.06.2025 11:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Always check for DCs with the Pre-Windows 2000 Compatible Access group enabled. Just saw one where pre-2000 support was ticked at setup - null sessions wide open. If netexec screams null but other hardening is in place, this group might’ve added Everyone/Anonymous..

#pentesting #CyberSecurity

13.06.2025 11:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability - Check Point Research Check Point Research uncovers Stealth Falcon's cyber espionage campaign exploiting a Microsoft Zero Day Vulnerability

There are a lot of really crap posts/news articles about how CVE-2025-33053 works with a lot of confusion around the actual components affected....the og research explains it really well with some really clear examples, great read...pretty simple:

research.checkpoint.com/2025/stealth...

12.06.2025 11:09 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

The car was so fast in this section, could brake super late and carry a bucket of speed, lush.

10.06.2025 09:57 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Awesome research both of you, it was a pleasure speaking to you! As I said earlier, we should do it again muahaha

10.06.2025 06:16 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Today was an extremely cool day for me, professionally. @zigula.bsky.social and I released our latest bit of security research (hacking Fortnite's Gemini LLM) and I had an absolutely fantastic time speaking with @tib3rius.bsky.social and @swiftsecur.bsky.social on @acrosspondpod.bsky.social!

10.06.2025 00:18 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 3    πŸ“Œ 0
Preview
Public Notice: Kyber Jailbreak on Fortnite Gemini LLM Research, Analysis, and Opinions on AI and LLMs

Are you a fan of #Fortnite? How about #StarWars? Do you like #AI stuff?

For immediate release to the public: Kyber Jailbreak Executed on Fortnite Gemini LLM as Darth Vader NPC.

Pub Disclosure: www.davidkuszmar.com/public-notic...

Video Evidence: youtu.be/tOTF7tqRNNs?...

09.06.2025 14:34 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 6    πŸ“Œ 0
Post image

Got a good half day of testing the new engine and diff out on track yesterday, heavy rain in the second half so called it there...but, man the car shifts now, if not a bit twitchy mid corner so, some setup work to do and we are there :)

09.06.2025 11:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Raw footage of my actual scoping process when the client writes 'don't know' in every field of the scoping questionnaire...

#pentesting

30.05.2025 16:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

yea that sums up my coding pretty well....

30.05.2025 15:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Exegol: professional hacking setup β€” Exegol documentation

A friend sent this over to me the other day...looks kinda interesting...

exegol.readthedocs.io

30.05.2025 13:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Across the Pondcast Podcast Β· Across the Pondcast Β· Cybersecurity rants and war stories from both sides of the Atlantic.

Episode 11: Certified Rant

@tib3rius.bsky.social & @swiftsecur.bsky.social rant about the chaos that is cybersecurity certs.

Spotify: open.spotify.com/sho...
Apple Podcasts: podcasts.apple.com/u...
Amazon Music: music.amazon.com/pod...
YouTube: www.youtube.com/chan...

23.05.2025 16:00 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 1    πŸ“Œ 1

If Fireman Sam taught me anything....its not to keep helping Norman Price.

22.05.2025 10:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Had a good chat with my mate @swiftsecur.bsky.social about the problem with app demo scoping calls. Don't get me wrong, demos are GREAT for learning how to use the app (100% required for a pentest).

However they only show the surface and 95% of the pentest deals with the stuff under the water. πŸ§΅πŸ‘‡

20.05.2025 16:29 β€” πŸ‘ 9    πŸ” 2    πŸ’¬ 2    πŸ“Œ 0

@swiftsecur is following 19 prominent accounts