Inside Salt Typhoon: China’s State-Corporate Advanced Persistent Threat | Salt Typhoon is a Chinese state-sponsored cyber threat group aligned with the Ministry of State Security (MSS), specializing in long-term espionage operations | dti.domaintools.com/inside-salt-ty…@DomainTools
LSASS dump via comsvcs.dll is still in play.
Recently seen in a ransomware cases
Rundll32 calling MiniDump from comsvcs is a big red flag.
I tested this in the lab. These 3 Sigma rules fired without fail 👇
Blog with full command and sigma rule links dropping soon..
This repository contains a utility for detecting potential BRICKSTORM backdoor compromises on Linux and BSD-based appliances and systems. (China-nexus APT)
github.com/mandiant/brick…
Pivoting within the Network: Getting Started with Chisel
Pivoting sometimes can be challenging. In this article, I’d like to introduce you to a tool that simplifies this process: Chisel.
hackers-arise.com/pivoting-withi…@three_cube
🚨 𝗕𝗥𝗜𝗖𝗞𝗦𝗧𝗢𝗥𝗠 𝗔𝗹𝗲𝗿𝘁: Mandiant (Google Threat Intelligence Group) has released a new report detailing BRICKSTORM—a threat actor toolset used to maintain persistent access within U.S.-based victim environments. Since March 2025, Mandiant Consulting has responded to…
Earlier this year, I worked one the most interesting and complex IRs of my career. The malware and techniques from that case turned out to be key TTPs observed in multiple subsequent UNC5221 cases!
cloud.google.com/blog/topics/th…
Had a blast attending and presenting at @labscon_io for the second year in a row! If you are curious about BYOVD in UEFI, and how we at @binarly_io uncovered an incomplete patch for a Supermicro BMC bug, check out our talk slides below👇
#tools#NetSec#Purple_Team_Exercises
"Domain Fronting is Dead, Long Live Domain Fronting: Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise", DEF CON 28.
]-> praetorian.com/blog/domain-fr…
]-> Google Cloud HTTP/HTTPS Redirector -…
A recent @HuntressLabs blog post sparked some conversation about how EDR products work, how investigations play out, and why forensic data, like browser history artifacts, is valuable to an investigation. We pulled that thread a bit further.
huntress.com/blog/what-is-m…
2K Followers 1K FollowingYesterday is history. Tomorrow is a mystery.
Cloud Solutions Engineer at Contoso. Hacktive Directory admin.
Posts don't represent my employer(s).
546 Followers 809 FollowingResearcher at Talos. No infosec drama, no opinions, no politics, Tech and Tools only. Author of Dyn. Data Resolver (Winner of Hex-Rays Plugin Contest 2020).
7K Followers 14 FollowingInfosec focused free software, research, publications, community activities @oss_security. Tweets are announcements. Please direct questions to @solardiz.
77K Followers 832 FollowingSenior reporter at @CyberSecDive covering all things digital security. I also co-host @hothtakes. | Send me tips: https://t.co/j2VflOTeFS
13K Followers 893 FollowingSelf taught maker just trying to make and learn more. LEDs and Game Boys. and a bit of gaming ofc Creator of @moddedgameboy club. she/her
318K Followers 75 FollowingKaspersky is the world’s largest privately held vendor of Internet security solutions for businesses and consumers. For support https://t.co/enRPRUIwcm
35K Followers 1 FollowingI’m Japanese! Recently focusing on foreign crime in Japan, and I also post about other Japanese topics. Thanks for stopping by🫶
17K Followers 15 FollowingSecurity reviews and research that keep winners winning. We apply unmatched hacking talent to secure critical software for the most innovative teams.
26K Followers 2 FollowingOffensiveCon Berlin is a technical international security conference focused on offensive security only. Organised by @Binary_Gecko. Stay tuned #OffensiveCon26.
17K Followers 0 Followingsecret club is a not-for-profit reverse-engineering group; publishing new research on popular software.
No ads, no cookies, just research.
30K Followers 561 FollowingCyBeRsEcUrItY | Not afraid to put down with some THICC malware on disk | securing and breaking AI @PaloAltoNtwks | Ex @spacex