All of this.
All of this.
ICYMI - Trimarc Security is now fully operating under TrustedSec! This marks a significant step forward in our mission to provide real-world security guidance to help our partners succeed. Read our blog by Founder and CEO David Kennedy to learn more! trustedsec.com/blog/trimarc...
Another HTM smuggling credential harvesting campaign targeting Microsoft 365 credentials. Full analysis of the campaign and walkthrough of how to analyze these payloads in the blog below
www.binarydefense.com/resources/bl...
Signal spam has been terrible lately
Fact check: nearly 70 percent of US money for Ukraine actually went to US defense industry to replenish the stocks of OLD stuff that went to Ukraine to use.
Much of which we would have paid to destroy as their lifespan expired.
Todaaaay!
Agentic AI, a term to impress,
But who wants a bot that creates a mess?
We asked for support, not free will's guise
Recently started watching βTo The Lakeβ on Netflix. Itβs actually a pretty good apoc show.
Miele canisters πͺ
Binary Defense ARC Labs researchers located an active C2 server used in Cleo MFT compromises and analyzed the 2nd and 3rd stage JAR files used in the post-exploitation activity.
www.binarydefense.com/resources/bl...
I should have know this exists
I have too many communication channelsβ¦ SMS, Slack, Teams, Discord, Signal, Twitter, Bsky, LinkedInβ¦.
My daughter just informed me that she needed some spaceβ¦ sheβs 2
A-10 go Brrrrrrrt. π₯΅
IMO for better or worse, itβs increasingly a requirement to be above average at one or two related skillsets but good at a lot then highly specialized in one.
Decided to let Vault Boy out of his plastic vault and onto the shelf.
Letβs be honest, itβs better used and adored than forgotten in a closet of trinkets that *may* hold resale value some day - right?
I love them cause itβs usually the first appt and the Dr isnβt running woefully behind yet!
I try to write technical blogs regularly on topics Iβm interested in. Recently this has been a lot of reverse engineering, Bluetooth, and networking hacks. But thereβs many other goodies too!
As Iβm invested in this aspect of bsky succeeding, hereβs a thread of my posts. Comments encouraged!
How many per re-skeet
New analysis out of ARC Labs on Rhadamanthys Stealer.
Utilizes native utilities like cmd, findstr, and tasklist to blend in with normal operations
It relies on process injection to hijack programs like OpenWith.exe and OOBE-Maintenance to mask activities.
www.binarydefense.com/resources/bl...
Perfect name for a essential oil MLM startup