Mark's Avatar

Mark

@sneakymonk3y.bsky.social

uber geek blue team cyber commando bad guy annihilator @CrowdStrike OSCP GREM GC|FA/FE/IH #DFIR - head in the clouds. https://you.sneakymonkey.net

17 Followers  |  67 Following  |  1 Posts  |  Joined: 25.02.2025  |  1.6242

Latest posts by sneakymonk3y.bsky.social on Bluesky

Citrix Netscaler customers - keep calm and patch CVE-2025-5777 from Tuesday.

It allows unauth memory reads, has similarities to CitrixBleed (CVE-2023-4966) as may allow session token theft.

20.06.2025 15:52 β€” πŸ‘ 84    πŸ” 36    πŸ’¬ 2    πŸ“Œ 2
Post image Post image

Huntress continues to observe in-the-wild exploitation of CVE-2025-30406, a critical vulnerability in Gladinet CentreStack and Triofox

22.04.2025 13:07 β€” πŸ‘ 1    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Preview
Detecting Fake CAPTCHA Campaigns: ClickFix, ClearFake, and Etherhide Summary

One of my good friends and former SOC protΓ©gΓ©β€”dropping πŸ”₯ analysis on a Monday afternoon. Epic work, @thecyber.dad πŸš€

www.thecyber.dad/p/detecting-...

22.04.2025 01:01 β€” πŸ‘ 7    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

CVE extension to March 16th 2026

See y’all March 15th 2026 for the last minute renewal πŸ«‘πŸ˜…

https://www.usaspending.gov/award/CONT_AWD_70RCSJ24FR0000018_7001_70RSAT20D00000001_7001

16.04.2025 14:31 β€” πŸ‘ 24    πŸ” 9    πŸ’¬ 2    πŸ“Œ 1
Post image

BREAKING.

From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.

15.04.2025 17:23 β€” πŸ‘ 695    πŸ” 420    πŸ’¬ 38    πŸ“Œ 207
Post image

Wow. CVE database is in serious trouble, in two days.

The cyber industry as a whole is in trouble also really, it’s the elephant in the room - the collapse of the White House’s support for cybersecurity is obvious and pronounced due to widespread cutbacks.

15.04.2025 18:12 β€” πŸ‘ 211    πŸ” 97    πŸ’¬ 9    πŸ“Œ 10
Post image Post image

cert.pl/uploads/docs... CERT Poland annual report.

04.04.2025 06:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Retro-style poster titled "Now You're Debugging with Power!" promoting the Sysinternals Suite by Microsoft. It depicts a smiling technician in a suit holding a wrench, standing before a futuristic control panel, with an atomic rocket illustration overhead. The poster lists various Sysinternals tools like Process Explorer, Autoruns, Proc Monitor, Diskmon, RAMMA, and VMMap, each humorously described with atomic-era metaphors, emphasizing their capabilities in Windows diagnostics. The visual style evokes mid-20th-century propaganda posters, using bold typography and a warm, vintage color palette.

Retro-style poster titled "Now You're Debugging with Power!" promoting the Sysinternals Suite by Microsoft. It depicts a smiling technician in a suit holding a wrench, standing before a futuristic control panel, with an atomic rocket illustration overhead. The poster lists various Sysinternals tools like Process Explorer, Autoruns, Proc Monitor, Diskmon, RAMMA, and VMMap, each humorously described with atomic-era metaphors, emphasizing their capabilities in Windows diagnostics. The visual style evokes mid-20th-century propaganda posters, using bold typography and a warm, vintage color palette.

Here is one for you: 50's/60's space atomic age ads.

01.04.2025 03:26 β€” πŸ‘ 38    πŸ” 8    πŸ’¬ 1    πŸ“Œ 0
Post image

CISA’s Red Team has been cut by DOGE. Somebody go hire them, they’re really good.

11.03.2025 05:25 β€” πŸ‘ 203    πŸ” 136    πŸ’¬ 9    πŸ“Œ 7
Preview
Use one Virtual Machine to own them allβ€Šβ€”β€Šactive exploitation of ESXicape A chain of three zero days allow threat actors to escape a Virtual Machine.

Update your VMware ESX farms ASAP.

There's an in the wild exploit chain being used which does VM -> Hypervisor escape, across all versions of ESXi. Allows full cluster access.

doublepulsar.com/use-one-virt...

05.03.2025 11:59 β€” πŸ‘ 62    πŸ” 29    πŸ’¬ 3    πŸ“Œ 2
Original post on cyberplace.social

3 different VMware zero days, under active exploitation by ransomware groups

CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

VMware ESXi
VMware Workstation Pro / Player (Workstation)
VMware Fusion
VMware Cloud Foundation
VMware Telco Cloud Platform

(Exploitation actually ESXi) […]

04.03.2025 14:19 β€” πŸ‘ 64    πŸ” 27    πŸ’¬ 2    πŸ“Œ 0

@sneakymonk3y is following 20 prominent accounts