Newcomers to password cracking should learn that in 1991 the 1st well known password cracker @alecmuffett.bsky.social's Crack introduced applying rules & permutations to dictionary words, such as substituting numbers for letters, reversing words, appending digits, & other common user habits. 1/3
05.03.2025 16:43
π 42
π 15
π¬ 3
π 3
The Ultimate Guide to Sigma Rules
Sigma rules are an open-source, platform agnostic format for building high-fidelity detections and engaging in proactive threat hunting so you can mature your security posture and overcome the cyberse...
Leveraging the capabilities of #Sigmarules can help optimize your log management solution for #security detection & response!
Learn about:
βWhy you should use them
πSpecific use cases
π¦΄Anatomy of a Sigma rule
π Sigma rule event processing for adv. detection capabilities
graylog.org/post/the-ult...
18.02.2025 22:55
π 3
π 1
π¬ 1
π 0
Iβd love one. π
17.01.2025 22:25
π 1
π 0
π¬ 1
π 0
Breaking: Cyberhaven Chrome Extension Compromised in Holiday Attack Campaign
An attacker successfully phished a Cyberhaven employee, gained access to Chrome Web Store admin credentials, published a malicious version of the extension
An attacker successfully phished a Cyberhaven employee.
They gained access to their Chrome Web Store admin credentials and published a malicious version of the Cyberhaven extension.
Read my full writeup here:
www.vulnu.com/p/breaking-c...
Thanks @jaimeblascob.bsky.social and @johntuckner.me
27.12.2024 03:20
π 40
π 17
π¬ 0
π 0
motivational poster that says "there is no AI in TEAM"
I'm going to revolutionize the motivational industry
21.12.2024 17:36
π 94
π 21
π¬ 7
π 3
PSA: upgrade your FortiOS devices, theyβre hiding a zero day again.
21.12.2024 00:06
π 37
π 13
π¬ 7
π 2
So you want to be a SOC analyst?
Well, then this is for youβ¦
15.12.2024 22:36
π 3
π 0
π¬ 0
π 0
Seeing as many security programs evaluate their coverage against Mitre Att&ck, itβs interesting to see the same being done for the products they rely on.
15.12.2024 21:34
π 2
π 0
π¬ 0
π 0
π
15.12.2024 15:33
π 3
π 0
π¬ 1
π 0
π’ β¬οΈ
09.12.2024 17:23
π 815
π 494
π¬ 3
π 8
Impressive indeed. But would it be enough to make Windows search usable? π€
09.12.2024 18:09
π 0
π 0
π¬ 0
π 0
This is brilliant! π¬π¬
07.12.2024 14:23
π 0
π 0
π¬ 0
π 0
I have been informed by my immigration firm I need to rapidly overcome burnout and depression and publish, publish, publish, knocked out a 15 page academic white paper yesterday and 8 page one today. If your publication needs something on industrial cybersecurityβ¦ ππ
06.12.2024 22:37
π 166
π 28
π¬ 10
π 1
We dodged the bullet once more. For the love of god why wonβt they give up this madness.
06.12.2024 22:49
π 0
π 0
π¬ 0
π 0
Anyone here in ICS, OT, SCADA security that I missed and need to add?
06.12.2024 18:19
π 8
π 7
π¬ 1
π 0
Destructive Malware: Threat Detection and Incident Response
Destructive malware makes systems, devices, and data unusuable to interrupt operations. With appropriate threat detection and incident response, organizations can mitigate destructive malware's impact...
Are you prepared to combat destructive #malware? β οΈβ οΈ
Trojans, worms, #ransomware & #botnets are all types of destructive malware that can wreck havoc on your systems. π°
Learn about the motivations behind deploying it, how it works, & how #TDIR can help. π‘οΈ
graylog.org/post/destruc... #cybersecurity
06.12.2024 21:09
π 1
π 1
π¬ 0
π 0
Finding out is the gravity of the fucking around universe. Thereβs just no fighting it.
06.12.2024 22:15
π 3
π 0
π¬ 0
π 0
Watch out for rogue browser extensions synced to your enterprise devices by compromised personal accounts. π₯
06.12.2024 22:08
π 60
π 15
π¬ 0
π 0
So, you disappeared Elite James Bond number of messages? π¬
06.12.2024 21:52
π 0
π 0
π¬ 0
π 0
Ever found yourself needing to decompress Windows 10/11 swap but lacked proper tooling?
If so, this is for youβ¦
06.12.2024 21:49
π 0
π 0
π¬ 0
π 0
DDoSecrets has released Library of Leaks, an online database of millions of hacked and leaked documents
search.libraryofleaks.org
05.12.2024 17:05
π 94
π 31
π¬ 3
π 3
EDR Silencers and Beyond: Exploring Methods to Block EDR Communication - Part 1
For red teams and adversary alike itβs important to stay hidden. As many companies nowadays have EDR agents deployed those agents are always in focus and tools like EDRSilencer or EDRSandblast useβ¦
π‘οΈWindows Firewall and WFP are only two ways to silence an #EDR agent.
π’In my latest blog post I discuss another network based technique to prevent data ingest and ways to detect it.
And if you want even more, checkout part 2 released by @Cyb3rMonk Link in the post
01.12.2024 15:04
π 21
π 10
π¬ 0
π 0