digicat@infosec.pubMEnglish · 8 days agoCTO at NCSC Summary: week ending August 17thplus-squarepinctoatncsc.substack.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCTO at NCSC Summary: week ending August 17thplus-squarepinctoatncsc.substack.comdigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 7 days agoWhen Defenders Become the Attackers: The Elastic EDR 0-Day (RCE + DoS)plus-squareashes-cybersecurity.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWhen Defenders Become the Attackers: The Elastic EDR 0-Day (RCE + DoS)plus-squareashes-cybersecurity.comdigicat@infosec.pubMEnglish · 7 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 8 days agoThere and Back Again: Detecting OT devices across protocol gatewaysplus-squarem.youtube.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThere and Back Again: Detecting OT devices across protocol gatewaysplus-squarem.youtube.comdigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 8 days agoShould Security Solutions Be Secure? Maybe We're All Wrong - Fortinet FortiSIEM Pre-Auth Command Injection (CVE-2025-25256)plus-squarelabs.watchtowr.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkShould Security Solutions Be Secure? Maybe We're All Wrong - Fortinet FortiSIEM Pre-Auth Command Injection (CVE-2025-25256)plus-squarelabs.watchtowr.comdigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 8 days agoPhishing and scams: how fraudsters are deceiving users in 2025plus-squaresecurelist.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPhishing and scams: how fraudsters are deceiving users in 2025plus-squaresecurelist.comdigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 8 days agoLazarOps: APT Tactics Targeting the Developers Supply Chainplus-squarewww.securityjoes.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLazarOps: APT Tactics Targeting the Developers Supply Chainplus-squarewww.securityjoes.comdigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 8 days agoHow XProtect’s detection rules have changed 2019-25plus-squareeclecticlight.coexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow XProtect’s detection rules have changed 2019-25plus-squareeclecticlight.codigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 8 days agoRussian hackers seized control of Norwegian dam, spy chief saysplus-squarewww.theguardian.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRussian hackers seized control of Norwegian dam, spy chief saysplus-squarewww.theguardian.comdigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 8 days agoFACADE: Fast and Accurate Contextual Anomaly DEtectionplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFACADE: Fast and Accurate Contextual Anomaly DEtectionplus-squaregithub.comdigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 8 days agoSS7: Securing a Legacy Protocol in a Modern Threat Landscape, and how information sharing can help to mitigate - Securityplus-squarewww.gsma.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSS7: Securing a Legacy Protocol in a Modern Threat Landscape, and how information sharing can help to mitigate - Securityplus-squarewww.gsma.comdigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 8 days agoCrossC2 Expanding Cobalt Strike Beacon to Cross-Platform Attacks -plus-squareblogs.jpcert.or.jpexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCrossC2 Expanding Cobalt Strike Beacon to Cross-Platform Attacks -plus-squareblogs.jpcert.or.jpdigicat@infosec.pubMEnglish · 8 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · edit-29 days agoNIST Releases Control Overlays for Securing AI Systems Concept Paperplus-squarecsrc.nist.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkNIST Releases Control Overlays for Securing AI Systems Concept Paperplus-squarecsrc.nist.govdigicat@infosec.pubMEnglish · edit-29 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 9 days ago2025 State of the Internet: Digging into Residential Proxy Infrastructureplus-squarecensys.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link2025 State of the Internet: Digging into Residential Proxy Infrastructureplus-squarecensys.comdigicat@infosec.pubMEnglish · 9 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 9 days agoSecurity Release for Matrix messaging - CVE-2025-49090plus-squarematrix.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecurity Release for Matrix messaging - CVE-2025-49090plus-squarematrix.orgdigicat@infosec.pubMEnglish · 9 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 9 days agoPoland foiled cyberattack on big city's water supply, deputy PM saysplus-squarewww.reuters.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPoland foiled cyberattack on big city's water supply, deputy PM saysplus-squarewww.reuters.comdigicat@infosec.pubMEnglish · 9 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 9 days ago🛡️ DEFCON Workshop: Putting EDRs in Their Place - 💀 Killing and Silencing EDR Agents Like an Adversaryplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link🛡️ DEFCON Workshop: Putting EDRs in Their Place - 💀 Killing and Silencing EDR Agents Like an Adversaryplus-squaregithub.comdigicat@infosec.pubMEnglish · 9 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 9 days agoHandala Hacker Exposed: Iran International Identifies Intelligence Ministry Operative Behind Cyber Attackplus-squareblog.narimangharib.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHandala Hacker Exposed: Iran International Identifies Intelligence Ministry Operative Behind Cyber Attackplus-squareblog.narimangharib.comdigicat@infosec.pubMEnglish · 9 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 9 days agoBitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secretsplus-squaretechcommunity.microsoft.comexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secretsplus-squaretechcommunity.microsoft.comdigicat@infosec.pubMEnglish · 9 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 9 days agoCybercrime in Australia 2024www.aic.gov.auexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCybercrime in Australia 2024www.aic.gov.audigicat@infosec.pubMEnglish · 9 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 10 days agoFoundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operatorsplus-squarewww.cisa.govexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFoundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operatorsplus-squarewww.cisa.govdigicat@infosec.pubMEnglish · 10 days agomessage-square0linkfedilink