Profile avatar
ftrsec.bsky.social
┌──(ftrsec㉿kali)-[/opt/bluesky] └─# cat bsky_desc.txt #Cybersecurity Sr. analyst & builder #Redteam lecturer at university #Splunk expert I love pandas
54 posts 71 followers 32 following
Prolific Poster

www.reversinglabs.com/blog/rl-iden...

techcommunity.microsoft.com/blog/microso...

isc.sans.edu/diary/From+P...

www.akamai.com/blog/securit...

Investigation on Xbash malware www.trustwave.com/en-us/resour...

Webshell through IIS www.trendmicro.com/en_us/resear...

www.trendmicro.com/en_hk/resear...

Happy new year ! Wish you all the best for the 2025 year ! I'm back to activity after a quick break, starting by sharing an interesting article about EAGERBEE backdoor. securelist.com/eagerbee-bac... #Cybersecurity #IoC #malware #infosec

#pwsh tip of the day! $PSBoundParameters doesn't account for params whom have a default value. Thankfully, you can still get this information! Enter $PSCmdlet! You can pull the bound parameters off of the Invocation Property of that object. I put together a quick example at: Happy Scripting!

apkleaks: Scanning APK file for URIs, endpoints & secrets meterpreter.org/apkleaks-sca...

Adding to my ETW research toolkit, a tiny program to consume information from a provider with as little overhead as possible. PockETWatcher, a tool to get the essential information from a ETW provider to the CLI or a JSON file github.com/olafhartong/...

www.secureblink.com/cyber-securi...

www.securitynewspaper.com/2024/12/26/t...

medium.com/@henrique4wi...

Merry Christmas to everyone! 🥳 Big respect to those in cyber holding the fort today ! Thank you !

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware gbhackers.com/skuld-malwar... #Infosec #Security #Cybersecurity #CeptBiro #Skuld #Malware #WindowsUtilitiesPackages #Malware

🎁 GenAI x Sec Advent #21 What happens when attackers compromise your GenAI system? Let's talk about LLM Hijacking 👇 🧐 LLM Hijacking is an attack where a threat actor gains unauthorized access to your LLM cloud resources and exploits them for their own […] [Original post on infosec.exchange]

And yet another supply chain attack socket.dev/blog/rspack-... #cybersecurity #infosec #malware

TrendMicro analysis on python-based nodestealer. I remind you that using the Startup folder to establish persistence is a common method used by attackers. www.trendmicro.com/en_us/resear... #infosec #cybersecurity #malware

For all the wazuh lovers, a small article to make detection on deerstealer with sysmon wazuh.com/blog/detecti...

Nmap command's 🔍

cyberpress.org/new-malware-...

Cable: .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation meterpreter.org/cable-net-po...

Logpoint's report examines StrelaStealer, an infostealer targeting email client credentials. www.logpoint.com/en/blog/stre... #cybersecurity #infosec #DFIR #malware #blueteam

A detailed article about DCOM lateral movement. www.deepinstinct.com/blog/forget-... #cybersecurity #infosec #ethicalhacking

This leak is a bit old (2021) but helps you to understand the TTP used and some commands example used by Conti. You can try to replay this on a test environement and try to check your detection on these MITRE ATT&CK Tactic ID. github.com/DISREL/Conti... #cybersecurity #detection #hacking #infosec

SPA is for Single-Page Abuse! - Using Single-Page Application Tokens to Enumerate Azure posts.specterops.io/spa-is-for-s...

A classical example of supply chain attacks. Nowadays, attackers more and more focus on 3rd party like github repository packages, be careful. Here is an interesting article by wiz about the ultralytics infection : www.wiz.io/blog/ultraly... #cybersecurity #infosec #github #malware #hacking #AI

In Sept 2024, Palo Alto Networks' Unit 42 detailed Splinter, a Rust-based post-exploitation tool misused by threat actors for persistence, credential theft, and data exfiltration. 🔗 unit42.paloaltonetworks.com/analysis-pen... #CyberSecurity #RedTeam #MalwareAnalysis #ThreatIntel #InfoSec

Report from Recorded Future highlighting BlueAlpha’s tactics: Spearphishing with HTML smuggling to drop VBScript-based malware and Cloudflare Tunnels to hide infrastructure. go.recordedfuture.com/hubfs/report... #CyberSecurity #ThreatIntel #Malware #InfoSec #APT #IoC #Detection

If you performed assessment on #windows you might be familiar with AMSI, aiming to enhance protection against miuses of #powershell. Here is an article about how AMSI integrates with MS Defender. learn.microsoft.com/en-us/defend... #cybersecurity #infosec #redteam #microsoft #antivirus #edr

Today in "no one reads the license agreement" - "The second stage is stored in a data file called license located in the assets directory of the unpacked apk file" https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/

#DNS security

Definitely an interesting project to follow for fast DFIR on an environment without SIEM github.com/Yamato-Secur... #cybersecurity #infosec #blueteam #dfir

ExecCmd64 lolbin www.hexacorn.com/blog/2024/12...

Interesting analysis of Braodo stealer by #Splunk team www.splunk.com/en_us/blog/s... #cybersecurity #infosec #malware #dfir #blueteam #IoC

🎁 GenAI x Sec Advent #6 🍯 In security, a honeypot is a decoy machine designed to attract attackers, to trap them or to study their behavior. This year at Defcon, my friend @0x4d31 introduced a clever idea on this concept. He combined a webserver […] [Original post on infosec.exchange]

The Symantec Threat Hunting Team analysis about chinese APT attacks www.security.com/threat-intel... #cybersecurity #detection #infosec #malware #blueteam #dfir #IoC #hacking

Analysis from Cyble about Lumma Stealer and Amadey cyble.com/blog/threat-... #cybersecurity #detection #dfir #blueteam #malware #IoC

New analysis of Xworm malware by researchers at Quick Heal Security Labs reveals new infection tactics. Read the full report here: www.seqrite.com/blog/xworm-m... #CyberSecurity #Malware #Detection #DFIR #IoC #InfoSec #blueteam

Looking for open-source red teaming tools? This GitHub repo offers a ton of resources, regularly updated, and covering everything from defense evasion to persistence: 🔗 github.com/infosecn1nja... #CyberSecurity #RedTeam #ThreatHunting #InfoSec #EthicalHacking #PenTest

Interesting Celestial Stealer Analysis by Trellix. www.trellix.com/blogs/resear... #Cybersecurity #IoC #malware #DFIR #Detection #Blueteam

Great article from Zscaler ThreatLabz about RevC2 and Venom Loader If you don't know about ThreatLabz, check their website and github with interesting ressources: github.com/ThreatLabz/ www.zscaler.com/blogs/securi... #Malware #IoC #Blueteam #Detection #CyberSecurity #Infosec #Zscaler #hacking