Let me explain where this incredible vulnerability in Notepad++ comes from... my blog post from 3w ago. The problem is there's no vuln. I described this as sneaky init access. You might as well do binary patching of any PE file in the world.
#infosecprint3m.github.io/blog/dll-sidel…
Lateral movement getting blocked by traditional methods?
@werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG
Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM.
github.com/trustedsec/Tit…
We have a free script that reveals hidden modules from certain Linux stealth rootkits such as the recent North Korean leak. See thread for the repo and check your hosts.
We have a free script that reveals hidden modules from certain Linux stealth rootkits such as the recent North Korean leak. See thread for the repo and check your hosts.
Pangolin is a self-hosted, WireGuard-based tunnelled reverse proxy that securely exposes internal HTTP/TCP/UDP services without opening ports
➤ ku.bz/MzkRYlF1l
🚨 Heads up, LinkedIn users!
On November 3rd, Microsoft will share your LinkedIn data to train AI models — and you’re opted in by default.
Here’s how to opt out:
Account > Settings & Privacy > Data Privacy > Data for Generative AI Improvement > Toggle OFF ✅
RTFM they say but if you read the manual and copy code examples from it you may inadvertently introduce vulns in your code 🙀
In April we audited the PHP code. Now we followed up with a review of the code snippets in PHP documentation and found 81 issues👇
blog.quarkslab.com/security-revie…
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
I have released the first half of "Binary Exploitation 101", a beginner-friendly guide to binary exploitation. You can learn from classic buffer overflow to ret2dlresolve through CTF-like challenges. I am working on the second half now. Stay tuned🔥
r1ru.github.io/categories/bin…
Just published a deep dive into APT27 (Emissary Panda/Iron Tiger/Lucky Mouse), a Chinese state-sponsored cyber-espionage group active since 2010, known for spear-phishing, watering-hole attacks and exploitation of internet-facing applications.
dexpose.io/threat-actor-p…
Got access to an AWS infrastructure during your RedTeam and you don't know how to do access persistence other than just adding an AccessKey ? 🫤
Step up your game with new TTPs ! 🫡
From IAM modification to lambda hijacking, 1001 ways to keep access !
riskinsight-wavestone.com/en/2025/09/aws…
⚠️ Trojan in disguise: PDF editor backdoor
The “AppSuite PDF Editor” poses as a legit tool but is a backdoor: most of its code supports malware functions, including C2 comms, scheduled tasks, and AES-encrypted data exfiltration.
Persistence is full, cleanup needs system repave.…
Hijack-as-a-Service: Abusing Azure Bastion Shareable Links for Phishing and Stealthy Persistence.
Check out my recent research about Azure Bastion and see how it can be used to phish users and achieve stealthy persistence.
medium.com/@matanb707/hij…#Persistence#Stealth#Phishing
Breaking MS Defender telemetry with DNS blackholing.
An old trick to blind the sensor - adding a new record in hosts file to redirect cloud-based entity to localhost.
A nice post by Elli Shlomo (@ellishlomo).
Source: cyberdom.blog/ghosting-the-s…#redteam#blueteam#maldev…
890 Followers 1K Following2x Founder @VoltAI & @Hackmetrix, Security Researcher. D̶o̶n̶’̶t̶ have the drive to become a big scary famous hacker. Always watching, never seen.
3 Followers 174 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/vOdpis6298
3K Followers 716 FollowingMicrosoft Certified Master (MCM): Active Directory.
Previously AD field engineer at Microsoft.
Notes from the field & the lab (@duff22b)
8K Followers 6K Following#InfoSec professional, husband & father of two (in random order). #BlueTeam #DFIR #APT #CTI #RedTeaming #BSidesZH (RT/Likes ≠ endorsement) 👀➡️#MalwareChallenge
31 Followers 530 FollowingWelcome to explore https://t.co/COLwPujJYs, our threat intelligence platform. happy to see you joining us and talking about how to protect your business from threats.
9K Followers 334 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
890 Followers 1K Following2x Founder @VoltAI & @Hackmetrix, Security Researcher. D̶o̶n̶’̶t̶ have the drive to become a big scary famous hacker. Always watching, never seen.
132K Followers 57 FollowingProviding intel from the Dark Web & Clearnet: Breaches, Ransomware, Darknet Markets, Threats, Crypto & more. Follow X Bot: @DarkWebIntelBot. https://t.co/Fi7VW9lg94
3K Followers 716 FollowingMicrosoft Certified Master (MCM): Active Directory.
Previously AD field engineer at Microsoft.
Notes from the field & the lab (@duff22b)
867 Followers 119 FollowingWelcome to the official Twitter for CICADA8! Your premier destination for cutting-edge research and development in the cybersecurity field
5K Followers 1 FollowingI'm not using this Twitter account anymore. Don't trust it. My new Twitter = @zebleerguy & you can verify that on my website and Telegram
12K Followers 24 FollowingAn annual awards ceremony celebrating and making fun of the achievements and failures of security researchers and the wider security community.
5K Followers 316 FollowingSecurity but not as in "national security". Playing CTFs with @redrocket_ctf (and @Sauercl0ud). Pwn2Own Vancouver 2020..=2024\{2023}. @[email protected]
343K Followers 48 FollowingOne of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.
2K Followers 540 FollowingBuilding valuable, hands-on learning experiences for 2000+ #cybersecurity specialists from all over the world.
Join us to educate, secure & change the world!
9K Followers 2K FollowingThreat Researcher | Co-Host of Atomics on a Friday | LOLDrivers & Atomic Red Team Maintainer | I'm Everywhere and Nowhere - BSG.
1K Followers 352 FollowingJust your friendly neighborhood APT :~# OSCE³ ℹ️Opinions are my own and not the views of my employer. 📌I’ll be at @BSidesTirana 2026 with @IAMCOMPROMISED