's Avatar

@cyberresearch

29
Followers
8
Following
822
Posts
26.02.2025
Joined
Posts Following

Latest posts by @cyberresearch

N-Grams, Quantum, and Malware – A Recipe for Chaos? | Dr. Jenn Ferreras
N-Grams, Quantum, and Malware – A Recipe for Chaos? | Dr. Jenn Ferreras N-Grams, Quantum, and Malware – A Recipe for Chaos? Presenter: Dr. Jenn Ferreras How are malware analysts using pattern analysis today? Malware analysts have long relied on n-grams to identify patterns in malicious code. By breaking binaries or scripts into smaller sequences, analysts can spot similarities, track malware families, and detect evasive techniques used by attackers. What happens when quantum computing enters the picture? This session asks a big question. What if we combine classical n-gram analysis with quantum computing techniques? Does it unlock dramatically better malware detection, or does it introduce more complexity than clarity? What is this talk about? This fast paced, no fluff talk takes a chaotic but fun dive into the intersection of quantum algorithms and traditional malware analysis. The goal is not hype, but exploration of what might actually be possible as quantum research continues to evolve. Could quantum improve polymorphic malware detection? Polymorphic malware constantly changes its structure to evade detection. This session explores whether quantum approaches could help identify malicious patterns earlier, even before the malware fully morphs. What challenges are discussed? Alongside the potential benefits, the talk also examines practical limitations, false assumptions, and where quantum approaches may introduce more noise than signal in real world detection workflows. Who should watch this talk? This session is designed for malware analysts, security researchers, data scientists, and anyone curious about the future of detection techniques at the intersection of classical and emerging technologies. What should attendees expect? Expect a lively discussion that blends theory, skepticism, and curiosity. The goal is to separate meaningful ideas from science fiction while having a little fun along the way. Sign Up for WWHF Register for this year’s Wild West Hackin Fest here: https://wildwesthackinfest.com/register/ Get access to workshops, labs, and sessions taught by experienced practitioners, all focused on real world defensive and investigative skills. #cybersecurity #malwareanalysis #quantumcomputing #infosec #securityresearch #threatdetection #reverseengineering #emergingtech #cyberawareness ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec Services Active SOC: https://www.blackhillsinfosec.com/services/active-soc/ Penetration Testing: https://www.blackhillsinfosec.com/services/ Incident Response: https://www.blackhillsinfosec.com/services/incident-response/ ///Backdoors & Breaches - Incident Response Card Game Backdoors & Breaches: https://www.backdoorsandbreaches.com/ Play B&B Online: https://play.backdoorsandbreaches.com/ ///Antisyphon Training Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/ Live Training: https://www.antisyphontraining.com/course-catalog/ On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/ Antisyphon Discord: https://discord.gg/antisyphon Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training ///Educational Infosec Content Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/ Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining Active Countermeasures YouTube: https://youtube.com/activecountermeasures Threat Hunter Community Discord: https://discord.gg/threathunter Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/

Originally from From WWHF: N-Grams, Quantum, and Malware – A Recipe for Chaos? | Dr. Jenn Ferreras ( :-{ı▓ #WWHF #BHIS #cyberresearch

07.03.2026 12:20 👍 0 🔁 0 💬 0 📌 0
Talkin' Bout [infosec] News 2026-03-09 #infosec #news
Talkin' Bout [infosec] News 2026-03-09 #infosec #news Join us LIVE on Mondays, 4:30pm EST. A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. https://bhisnews.transistor.fm Chat with us on Discord! - https://discord.gg/bhis 🔴live-chat 🔗 Register for FREE webcasts, summits, and workshops - https://poweredbybhis.com Brought to you by: Black Hills Information Security https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com #livestream #infosec #news #BHIS #podcast #Cybersecurity #infosecnews

Originally from BHIS: Talkin' Bout [infosec] News 2026-03-09 #infosec #news ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch

07.03.2026 09:34 👍 0 🔁 0 💬 0 📌 0
Preview
AI as tradecraft: How threat actors operationalize AI Threat actors are operationalizing AI to scale and sustain malicious activity, accelerating tradecraft and increasing risk for defenders, as illustrated by recent activity from North Korean groups such as Jasper Sleet and Coral Sleet (formerly Storm-1877). The post AI as tradecraft: How threat actors operationalize AI appeared first on Microsoft Security Blog.

Originally from MS Threat Intel: AI as tradecraft: How threat actors operationalize AI ( :-{ı▓ #CTI #cybersecurity #cyberresearch

07.03.2026 09:17 👍 0 🔁 0 💬 0 📌 0
Preview
An Investigation Into Years of Undetected Operations Targeting High-Value Sectors In-depth analysis of threat activity we call CL-UNK-1068. We discuss their toolset, including tunneling, reconnaissance and credential theft. The post An Investigation Into Years of Undetected Operations Targeting High-Value Sectors appeared first on Unit 42.

Originally from Unit 42: An Investigation Into Years of Undetected Operations Targeting High-Value Sectors ( :-{ı▓ #unit42 #threathunting #cyberresearch

07.03.2026 07:17 👍 0 🔁 0 💬 0 📌 0
Preview
Hunting for malicious OpenClaw AI in the modern enterprise We deconstruct a threat hunt for malicious OpenClaw AI agents, outlining how we identify and migitate risks posed by unauthorized AI skills.

Originally from Red Canary: Hunting for malicious OpenClaw AI in the modern enterprise ( :-{ı▓ #threatintel #redcanary #cyberresearch

06.03.2026 10:20 👍 0 🔁 0 💬 0 📌 0
Preview
FBI Seizes Leakbase: One of the Largest English-Speaking Cybercrime Forums Shut Down The FBI has seized and taken control of Leakbase, one of the largest English-speaking cybercrime forums in recent history. The takedown marks a significant milestone in the ongoing global effort to dismantle underground markets for stolen data. Seizure banner on the Leakbase homepage Details of the Takedown: Operation Leak On March 3 and 4, 2026, […] The post FBI Seizes Leakbase: One of the Largest English-Speaking Cybercrime Forums Shut Down appeared first on Flare | Threat Exposure Management | Unmatched Visibility into Cybercrime.

Originally from Flare: FBI Seizes Leakbase: One of the Largest English-Speaking Cybercrime Forums Shut Down ( :-{ı▓ #flare #CTI #cyberresearch

06.03.2026 09:20 👍 0 🔁 0 💬 0 📌 0
Preview
Building a Detection Foundation: Part 2 - Windows Security Events The Audit Policies Nobody ConfiguresIn Part 1, we looked at why relying on a single telemetry source is a recipe for blind spots. Now let's get practical. Windows has a rich set of security auditing capabilities…

Originally from TrustedSec: Building a Detection Foundation: Part 2 - Windows Security Events ( :-{ı▓ #trustedsec #pentesting #cyberresearch

05.03.2026 14:40 👍 0 🔁 0 💬 0 📌 0
Webinar - CMMC Challenges and Misunderstandings
Webinar - CMMC Challenges and Misunderstandings The defense supply chain is struggling with CMMC implementation, and it’s not because the requirements are inherently complex. The problem is misinformation, scope creep, and upstream contractors who don’t understand when CMMC actually applies. During our next webinar, our experts will cover the misunderstandings that are creating the most problems for contractors and subcontractors, from CUI marking confusion to unnecessary Level 2 requirements. In this live session, we will cover: - Understanding what CUI really means and when protection is actually required - Distinguishing between ITAR, classified information, and legitimate CUI - Identifying when CMMC Level 2 certification is truly necessary - Managing upstream contractors who are overreaching with CMMC requirements - Controlling scope creep in your compliance program - Ensuring external service provider compliance without overcomplicating the process Join us for an in-depth session with Director of Advisory Services Chris Camejo and Compliance Practice Lead Lee Quinton that addresses the real challenges you’re facing in your CMMC journey. They’ll dig into the specific issues that are causing delays, increasing costs, and creating compliance headaches across the defense industry. Designed for contractors, subcontractors, and service providers, this webinar will provide practical, actionable guidance to navigate CMMC requirements effectively. Get the clarity your CMMC program needs to succeed. Let’s tackle your CMMC questions together!

Originally from From TrustedSec: Webinar - CMMC Challenges and Misunderstandings ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch

05.03.2026 12:28 👍 0 🔁 0 💬 0 📌 0
Preview
Breaking down a supply chain attack leveraging a malicious Google Workspace OAuth app How to detect and respond to OAuth consent attacks in Google Workspace

Originally from Red Canary: Breaking down a supply chain attack leveraging a malicious Google Workspace OAuth app ( :-{ı▓ #threatintel #redcanary #cyberresearch

05.03.2026 10:23 👍 0 🔁 0 💬 0 📌 0
Preview
The “P” in PAM is for Persistence: Linux Persistence Technique Learn about a pentesting tool using the Pluggable Authentication Module for privilege escalation, lateral movement, and persistence in Linux. The post The “P” in PAM is for Persistence: Linux Persistence Technique appeared first on Black Hills Information Security, Inc..

Originally from BHIS: The “P” in PAM is for Persistence: Linux Persistence Technique ( :-{ı▓ #BlackHillsInfoSec #Pentesting #cyberresearch

05.03.2026 09:25 👍 0 🔁 0 💬 0 📌 0
Preview
Monitoring Cyberattacks Directly Linked to the US-Israel-Iran Military Conflict The US-Israel-Iran conflict has generated one of the most intensive periods of state-linked cyber warfare since the Russia-Ukraine war, with operations conducted by both sides across multiple domains including critical infrastructure, financial systems, communications networks, and social media platforms. The cyber dimension of this conflict encompasses three distinct phases:  Each phase saw a marked increase […] The post Monitoring Cyberattacks Directly Linked to the US-Israel-Iran Military Conflict appeared first on Flare | Threat Exposure Management | Unmatched Visibility into Cybercrime.

Originally from Flare: Monitoring Cyberattacks Directly Linked to the US-Israel-Iran Military Conflict ( :-{ı▓ #flare #CTI #cyberresearch

05.03.2026 09:23 👍 0 🔁 0 💬 0 📌 0
Preview
Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale Tycoon2FA has become a leading phishing-as-a-service (PhaaS) platforms, enabling campaigns that reach over 500,000 organizations monthly, prompting Microsoft’s Digital Crimes Unit (DCU) to work with Europol and industry partners to facilitate a disruption of Tycoon2FA’s infrastructure and operations. The post Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale appeared first on Microsoft Security Blog.

Originally from MS Threat Intel: Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale ( :-{ı▓ #CTI #cybersecurity #cyberresearch

05.03.2026 09:23 👍 0 🔁 0 💬 0 📌 0
Preview
Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel A high-severity CVE-2026-0628 in Chrome's Gemini allowed local file access and privacy invasion. Google quickly patched the flaw. The post Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel appeared first on Unit 42.

Originally from Unit 42: Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel ( :-{ı▓ #unit42 #threathunting #cyberresearch

05.03.2026 07:23 👍 0 🔁 0 💬 0 📌 0
Obviously, you have to call an AI "Jarvis" #ai #podcast
Obviously, you have to call an AI "Jarvis" #ai #podcast When AI can integrate across projects, systems, and security with a simple text, innovation stops being theoretical — it becomes reality. Watch the full episode "Ten Years: A Decade of Doing This" now! https://youtu.be/zlaWEVnu8Pg

Originally from From TrustedSec: Obviously, you have to call an AI "Jarvis" #ai #podcast ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch

04.03.2026 12:31 👍 0 🔁 0 💬 0 📌 0
Preview
How Neo found an SSRF vulnerability in Faraday, and why it matters for every team that ships code Executive Summary Neo found a Server-Side Request Forgery (SSRF) vulnerability in Faraday, a widely used HTTP client library in the Ruby ecosystem. This is Neo’s first credited CVE discovery. Neo is ProjectDiscovery’s AI security copilot for tasks like code review and vulnerability discovery. For this finding, Neo reviewed a widely used open source dependency and, without human guidance, surfaced a subtle URL-handling edge case, validated it in runtime, and produced a clear write-up that maint

Originally from ProjectDiscovery: How Neo found an SSRF vulnerability in Faraday, and why it matters for every team that ships code ( :-{ı▓ #projectdiscovey #bugbounty #cyberresearch

04.03.2026 11:36 👍 0 🔁 0 💬 0 📌 0
Learning to Trust AI Agents with Automation w/ Ethan and Derek
Learning to Trust AI Agents with Automation w/ Ethan and Derek 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com What if you could safely harness AI agents to automate real work, without spending a dime?  Join us for a free one-hour BHIS webcast with Ethan Robish and Derek Banks to cut through the hype and learn what coding agents really are, why they’re not just for developers, and how to start for free.  You’ll learn how tools like Opencode work, how to overcome security and trust barriers, and how to give agents the context, skills, and guardrails they need to safely plan, execute, and iterate. Chat with your fellow attendees in the Black Hills Infosec Discord server: https://discord.gg/BHIS in the #🔴live-chat channel.

Originally from BHIS: Learning to Trust AI Agents with Automation w/ Ethan and Derek ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch

04.03.2026 09:42 👍 2 🔁 0 💬 0 📌 0
Preview
Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild Uncover real-world indirect prompt injection attacks and learn how adversaries weaponize hidden web content to exploit LLMs for high-impact fraud. The post Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild appeared first on Unit 42.

Originally from Unit 42: Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild ( :-{ı▓ #unit42 #threathunting #cyberresearch

04.03.2026 07:27 👍 0 🔁 0 💬 0 📌 0
Discord Livestream - AMA: Incident Response
Discord Livestream - AMA: Incident Response Join us for our next Discord Livestream “AMA: Incident Response” on March 19 at 11:00am ET! Incident Response Practice Lead Ryan Macfarlane will field your questions on what TrustedSec is seeing on IR engagements, common attack vectors, as well as AI threats and how criminal and nation state actors are using it. Ryan is also willing to answer questions about his time as an FBI Cyber agent – questions about aliens will be considered on a case-by-case basis ;) Bring all your incident response questions and connect with our Discord community!

Originally from From TrustedSec: Discord Livestream - AMA: Incident Response ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch

03.03.2026 12:33 👍 1 🔁 0 💬 0 📌 0
Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT | Patrick Wheltle
Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT | Patrick Wheltle Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT Patrick Wheltle How can job seekers research companies before applying? In today’s job market, it is easier than ever to share professional information with companies that may not be legitimate. This talk focuses on how job seekers can use basic research techniques to avoid wasting time or exposing sensitive details to organizations with no real intent to hire. What is this presentation about? This session explores a series of methods that can be used to research companies claiming to be hiring qualified applicants. The goal is to help professionals verify legitimacy before submitting resumes, portfolios, or personal data. What role does OSINT play in job research? Using open-source intelligence techniques, the talk demonstrates how publicly available information can reveal red flags about a company’s operations, leadership, and credibility. Attendees will learn where to look and what questions to ask when evaluating a potential employer. What case study is covered? The presentation includes a real world case study of a company advertising roles with unusually high compensation. On the surface, the opportunity looked promising. However, basic OSINT research revealed deeper concerns. What was uncovered during the investigation? The company appeared to have no customers, no public reputation, and no verifiable business activity. Further research uncovered layers of shell companies and raised questions about whether the listed officers were even real individuals. Why does this matter for job seekers? Job scams and deceptive hiring practices can lead to identity theft, financial loss, or wasted effort. This session shows how a small amount of investigation can protect professionals from falling into these traps. Who should watch this talk? This campfire talk is ideal for job seekers, security professionals, recruiters, and anyone interested in OSINT or online investigation techniques. What is the takeaway? Sometimes the truth is hidden in plain sight. Knowing where to look can make all the difference. Sign Up for WWHF Register for this year’s Wild West Hackin Fest here: https://wildwesthackinfest.com/register/ Get access to workshops, labs, and sessions taught by experienced practitioners, all focused on real world defensive and investigative skills. #cybersecurity #osint #jobsearch #careeradvice #infosec #onlinesafety #employmentscams #digitalinvestigations #cyberawareness ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec Services Active SOC: https://www.blackhillsinfosec.com/services/active-soc/ Penetration Testing: https://www.blackhillsinfosec.com/services/ Incident Response: https://www.blackhillsinfosec.com/services/incident-response/ ///Backdoors & Breaches - Incident Response Card Game Backdoors & Breaches: https://www.backdoorsandbreaches.com/ Play B&B Online: https://play.backdoorsandbreaches.com/ ///Antisyphon Training Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/ Live Training: https://www.antisyphontraining.com/course-catalog/ On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/ Antisyphon Discord: https://discord.gg/antisyphon Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training ///Educational Infosec Content Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/ Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining Active Countermeasures YouTube: https://youtube.com/activecountermeasures Threat Hunter Community Discord: https://discord.gg/threathunter Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/

Originally from From WWHF: Ghost Jobs and Ghost Companies: Pulling Back the Curtain Using OSINT | Patrick Wheltle ( :-{ı▓ #WWHF #BHIS #cyberresearch

03.03.2026 12:32 👍 0 🔁 0 💬 0 📌 0
Preview
Red Canary CFP tracker: March 2026 Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines

Originally from Red Canary: Red Canary CFP tracker: March 2026 ( :-{ı▓ #threatintel #redcanary #cyberresearch

03.03.2026 10:30 👍 0 🔁 0 💬 0 📌 0
Preview
Counterfeits, Money Laundering, and Scams in the Cybercrime Haute Couture Economy By Assaf Morag, Cybersecurity Researcher Haute couture is presented as the most controlled, exclusive, and artisanal corner of the fashion industry. Invitation-only shows. One-of-one garments. Months of handwork. Astronomical prices. But when you step away from the runway narrative and look at couture as a system (materials, labor, knowledge, logistics, and incentives), a different picture […] The post Counterfeits, Money Laundering, and Scams in the Cybercrime Haute Couture Economy appeared first on Flare | Threat Exposure Management | Unmatched Visibility into Cybercrime.

Originally from Flare: Counterfeits, Money Laundering, and Scams in the Cybercrime Haute Couture Economy ( :-{ı▓ #flare #CTI #cyberresearch

03.03.2026 09:29 👍 0 🔁 0 💬 0 📌 0
Preview
Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran Unit 42 details recent Iranian cyberattack activity, sharing direct observations of phishing, hacktivist activity and cybercrime. We include recommendations for defenders. The post Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran appeared first on Unit 42.

Originally from Unit 42: Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran ( :-{ı▓ #unit42 #threathunting #cyberresearch

03.03.2026 07:29 👍 0 🔁 0 💬 0 📌 0
Preview
Week 09 – 2026 Belkasoft X v2.10 Is Here—With Smarter AI Assistant – BelkaGPT now holds context—ask follow-up questions without restating your query– Import Magnet Axiom (.mfdb) cases directly for AI analysis– Similar face search and grouping across pictures, no external tools needed– Timestamped transcriptions in audio and video help pin statements to exact moments  Request your trial of […]

Originally from This Week in 4n6: Week 09 – 2026 ( :-{ı▓ #dfir #incidentresponse #cyberresearch

02.03.2026 07:32 👍 0 🔁 0 💬 0 📌 0
Ethics on the Line Balancing Social Engineering Success with Target Protection | Jennifer Isacoff
Ethics on the Line Balancing Social Engineering Success with Target Protection | Jennifer Isacoff Ethics on the Line Balancing Social Engineering Success with Target Protection Presenter: Jennifer Isacoff Why do social engineering assessments raise ethical concerns? Social engineering engagements like phishing and vishing are powerful tools for exposing weaknesses in an organization’s defenses. They work by exploiting human trust. But what happens to the people who fall for them after the test is over? What is this talk about? This 15 minute campfire talk explores the ethical challenges of selling and conducting social engineering assessments without causing unintended harm to employees. Even when reports anonymize identities, basic security logs can often reveal who failed, sometimes leading to blame or punishment long after the engagement ends. Why is this a problem for practitioners? This creates a difficult question for social engineering professionals. How do you clearly demonstrate risk to a client while protecting the individuals being tested? The tension between accountability and education can undermine trust in both the assessment and the security team. What ethical questions are discussed? The session sparks an open discussion around whether mandatory post engagement training is the only ethical path forward, or if engagements can be designed to preserve anonymity while still delivering meaningful value to clients. What real world experiences inform this talk? Drawing from real world social engineering engagements, the discussion explores situations where proving impact, such as initial access or credential capture, conflicted with safeguarding individuals from negative consequences. What solutions are on the table? Expect a lively debate around practical approaches including creative contract language, log obfuscation strategies, client education, and engagement design choices that prioritize learning over punishment. Who should attend? This talk is for social engineering professionals, red teamers, defenders, and newcomers interested in the human side of security testing. What is the goal of this session? This is not just about ethics. It is about sustaining trust in the craft of social engineering while responsibly addressing the human factor that makes these attacks so effective. Bring your stories, ideas, and opinions and let’s hash it out around the campfire. Sign Up for WWHF Register for this year’s Wild West Hackin Fest here: https://wildwesthackinfest.com/register/ Get access to workshops, labs, and sessions taught by experienced practitioners, all focused on real world defensive and investigative skills. #cybersecurity #socialengineering #phishing #vishing #infosec #redteam #securityethics #humanfactor #defensivesecurity #cyberawareness ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec Services Active SOC: https://www.blackhillsinfosec.com/services/active-soc/ Penetration Testing: https://www.blackhillsinfosec.com/services/ Incident Response: https://www.blackhillsinfosec.com/services/incident-response/ ///Backdoors & Breaches - Incident Response Card Game Backdoors & Breaches: https://www.backdoorsandbreaches.com/ Play B&B Online: https://play.backdoorsandbreaches.com/ ///Antisyphon Training Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/ Live Training: https://www.antisyphontraining.com/course-catalog/ On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/ Antisyphon Discord: https://discord.gg/antisyphon Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training ///Educational Infosec Content Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/ Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining Active Countermeasures YouTube: https://youtube.com/activecountermeasures Threat Hunter Community Discord: https://discord.gg/threathunter Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/

Originally from From WWHF: Ethics on the Line Balancing Social Engineering Success with Target Protection | Jennifer Isacoff ( :-{ı▓ #WWHF #BHIS #cyberresearch

28.02.2026 12:41 👍 0 🔁 0 💬 0 📌 0
Intro to PAMSkeletonKey for Persistence w/ Ben Bowman
Intro to PAMSkeletonKey for Persistence w/ Ben Bowman 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com How does PAM abuse fit into a real‑world attack chain? Join us for a free one‑hour BHIS webinar with Ben Bowman as he introduces PAMSkeletonKey, a tool designed for red teamers and CTF players to explore persistence, lateral movement, and privilege escalation on Linux systems. Ben will teach why the tool was created, how to use it safely in lab environments, and what this technique means for defenders working to detect or prevent authentication abuse. You'll learn a practical understanding of Linux PAM (Pluggable Authentication Modules) authentication and how it can be abused to create a skeleton‑key backdoor for persistence. Get started with PAMSkeletonKey: https://github.com/her3ticAVI/PAMSkeletonKey Chat with your fellow attendees in the Black Hills Infosec Discord server: https://discord.gg/BHIS in the #🔴live-chat channel.

Originally from BHIS: Intro to PAMSkeletonKey for Persistence w/ Ben Bowman ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch

28.02.2026 09:54 👍 0 🔁 0 💬 0 📌 0
Preview
AI code review has come a long way, but it can’t catch everything AI code review can reason about intent, but real incidents often stem from business logic flaws that only show up in runtime. Our benchmark reveals where code-only review falls short.

Originally from ProjectDiscovery: AI code review has come a long way, but it can’t catch everything ( :-{ı▓ #projectdiscovey #bugbounty #cyberresearch

27.02.2026 11:51 👍 0 🔁 0 💬 0 📌 0
Preview
Apache ActiveMQ Exploit Leads to LockBit Ransomware Key Takeaways An audio version of this report can be found on Spotify, Apple, YouTube, Audible, & Amazon.  This intrusion began in mid-February 2024 after a threat actor exploited a vulnerability (CVE-2023-46604) on an exposed Apache ActiveMQ server. The threat actor was able to perform remote code execution (RCE) by using a Java Spring class and a custom Java Spring […] The post Apache ActiveMQ Exploit Leads to LockBit Ransomware appeared first on The DFIR Report.

Originally from The DFIR Report: Apache ActiveMQ Exploit Leads to LockBit Ransomware ( :-{ı▓

27.02.2026 09:38 👍 0 🔁 0 💬 0 📌 0
Preview
Hook, line, and vault: A technical deep dive into the 1Phish kit We analyze the evolution of the 1Phish phishing kit from a basic credential harvester into an MFA-aware, multi-stage phishing kit targeting 1Password users.

Originally from DataDog: Hook, line, and vault: A technical deep dive into the 1Phish kit ( :-{ı▓ #cloudsecurity #datadog #cyberresearch

27.02.2026 07:38 👍 0 🔁 0 💬 0 📌 0
AI-Generated Zoom Video Attacks? It's more common than you think. #podcast #security
AI-Generated Zoom Video Attacks? It's more common than you think. #podcast #security We are getting a lot of requests for AI-generated Zoom video attacks! It's ramping up quick. Watch the full episode on LLM attacks now! https://youtu.be/QA_j4ZUYDAs

Originally from From TrustedSec: AI-Generated Zoom Video Attacks? It's more common than you think. #podcast #security ( :-{ı▓ #TrustedSec #Pentesting #cyberresearch

26.02.2026 12:48 👍 0 🔁 0 💬 0 📌 0
Preview
The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity The protocol gap is real. Authentication proves identity once but remember that session protection must be continuous.

Originally from Red Canary: The million-dollar front door and the tailgater: Why strong auth could fail at SaaS session integrity ( :-{ı▓ #threatintel #redcanary #cyberresearch

26.02.2026 10:44 👍 1 🔁 0 💬 0 📌 0