Advertisement · 728 × 90

Posts by Opalsec

Preview
Merry Christmas Day! Have a MongoDB security incident. Somebody from Elastic Security decided to post an exploit for CVE-2025–14847 on Christmas Day.

patch ye MongoDB, there's an exploit for a vuln which has been in the product for over a decade that allows the remote, unauth read of any memory - which includes plaintext creds.

Somebody posted an exploit on Christmas Day, Merry Christmas!

doublepulsar.com/merry-christ...

3 months ago 103 45 4 3
Video

another robot highlight for 2025: man wearing humanoid mocap suit kicks himself in the balls

3 months ago 47026 14479 953 3130

If you’ve been laid off from a cyber threat intel position, and you want a ticket to CYBERWARCON, please reach out.

5 months ago 25 23 0 0
Preview
Lessons from the BlackBasta Ransomware Attack on Capita CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security

New Blog! Lessons from the BlackBasta Ransomware Attack on Capita

When a company that manages data for millions of UK citizens falls victim to ransomware, the whole industry should pay attention to it. 📝

blog.bushidotoken.net/2025/10/less...

5 months ago 8 2 0 0
Preview
Hacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agent The wiping commands probably wouldn't have worked, but a hacker who says they wanted to expose Amazon’s AI “security theater” was able to add code to Amazon’s popular ‘Q’ AI assistant for VS Code, whi...

Hacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agent

🔗 www.404media.co/hacker-plant...

8 months ago 125 33 1 9

Important and very timely research:

8 months ago 10 3 0 0

So... known hacked agencies so far include:

-US Department of Homeland Security
-US National Nuclear Security Administration
-US National Institutes of Health

Did I miss any?

8 months ago 28 16 2 2
Advertisement
Post image

Oh the critical vuln is in SHAREPOINT, gotcha

8 months ago 27 5 2 0
Preview
The Amnban Files: Inside Iran's Cyber-Espionage Factory Targeting Global Airlines They called themselves cybersecurity experts. They're actually Tehran's digital hit squad.Someone handed me the keys to the kingdom—gigabytes of data ripped ...

An Iranian security firm is behind a years-long hacking campaign that targeted airlines all over the world.

Security firm Amnban is allegedly one of the contractors behind an Iranian hacking group known as APT39.

blog.narimangharib.com/posts/2025%2...

8 months ago 16 8 0 0
Preview
A prolific hacking group that's shutdown retailers and insurance companies turns to aviation A cyberattack on WestJet last week is likely tied to the Scattered Spider gang, a source tells Axios.

Mandiant is now aware of multiple incidents in the airline sector that resemble Scattered Spider. The industry should button up its call centers where this actor has had a lot of success with social engineering. www.axios.com/2025/06/27/a...

9 months ago 22 14 0 1
Preview
Adam Jacobs 🇺🇦 (@statsguy@mas.to) Attached: 1 image Oh gosh, it's true, you really can enter a completely nonsense phrase into Google, ask for its meaning, and lo and behold, Google's AI will make shit up. So if you've ever wondered...

mas.to/@statsguy/11...

Google, this is why I can't trust your AI generated answers

11 months ago 0 0 0 0
Preview
Microsoft Recall on Copilot+ PC: testing the security and privacy implications A look at the risks and tradeoffs with Microsoft Recall.

I took a look at the changes to Microsoft Recall, which is rolling out to compatible Windows devices soon.

Photographic memory that stores all your deleted messages, keystrokes etc 😅

doublepulsar.com/microsoft-re...

11 months ago 95 46 6 7
Preview
a man carrying a box in front of a sign that says no parking fire lane ALT: a man carrying a box in front of a sign that says no parking fire lane

"Defense Secretary Pete Hegseth shared detailed information about forthcoming strikes in Yemen on March 15 in a private Signal group chat that included his wife, brother and personal lawyer, according to four people with knowledge of the chat."

www.nytimes.com/2025/04/20/u...

11 months ago 0 0 0 0
Preview
Is "Cyber" a Legitimate Weapon in a Tariff War? Amidst the US-China trade war drama, would China actually pull the trigger on destructive cyber attacks using known footholds (think Volt & Salt Typhoon) in US critical infrastructure? Probably not, b...

In the midst of a Trade War - would China actually pull the trigger on destructive cyber attacks using known footholds (think Volt & Salt Typhoon) in US critical infrastructure? 🤔

We've taken a closer look at how this could - and has - unfolded: opalsec.io/is-cyber-a-l...

#InfoSec #ThreatIntel

11 months ago 0 0 0 0
Video

Chris Krebs (@thekrebscycle.bsky.social) is being politically persecuted, and in this week's Seriously Risky Business podcast @tom.risky.biz and I talk about why we're not expecting an outcry from angry cybersecurity executives

FULL VIDEO: www.youtube.com/watch?v=1oSJ...
AUDIO: risky.biz/SRB117/

11 months ago 61 16 3 2
Preview
CISA reverses course, extends MITRE CVE contract While the last-minute extension averts an immediate lapse in support, rival organizations are being stood up to supplant the global vulnerability system.

In a last-minute switch, the #CISA said it will continue funding a contract for #MITRE to manage the CVE program and other vulnerability databases. via @derekbjohnson.bsky.social cyberscoop.com/cisa-reverse...

11 months ago 2 3 0 0
Advertisement

This makes no sense if you look at it from a targeting point of view. Why would the NSA even go after a sporting event. There isn't anything of worth for an intel op there.

This looks like a political move, China falling for a false flag, or just a straight-up made up case

11 months ago 15 3 3 1
Preview
Risky Bulletin: Chinese APT abuses Windows Sandbox to go invisible on infected hosts - Risky Business Media A Chinese cyber-espionage group named MirrorFace (aka Earth Kasha, APT10) is abusing the Windows Sandbox virtual environment to hide the e [Read More]

@campuscodi.risky.biz did a great write up on an APT10's clever use of the Windows Sandbox to keep malware stealthy... running malware in Windows Sandbox via a scheduled task from a separate account is smart.

You don't gotta hand it to 'em etc.

risky.biz/risky-bullet...

11 months ago 18 5 0 0
Post image

Palo Alto looks at Slow Pisces, a North Korean APT and its recent campaign that targeted cryptocurrency developers on LinkedIn, posing as potential employers, and sending malware disguised as coding challenges.

unit42.paloaltonetworks.com/slow-pisces-...

11 months ago 13 6 0 0
The Oval Office

The Oval Office

A screenshot from Alibaba

A screenshot from Alibaba

A comparison of the photo from the Oval Office and an item on Alibaba.

A comparison of the photo from the Oval Office and an item on Alibaba.

The Oval Office

The Oval Office

Noticed a bunch of these ornate gold medallions slapped all over the Oval Office. We found em on Alibaba. “High-density Home Decoration Polyurethane Appliques Ornament PU Foam Veneer Accessories” from seller Guangzhou Homemax Decorative Material Limited.

sherwood.news/power/shop-t...

11 months ago 7380 2422 649 777
Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks
Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks YouTube video by CyberScoop

#Chinese law enforcement places #NSA operatives on wanted list over alleged #cyberattacks. The allegations, supported by the foreign ministry, are more specific and aggressive than usual and say the U.S. sought to disrupt the Asian Winter Games. via @timstarks.bsky.social youtu.be/SAPjQxbruL0?...

11 months ago 4 3 0 0

Dutch police study on ransomware:

-companies with cyber insurance pay almost 2.8 times bigger ransoms than non-insured ones
-95/100 have to pay ransomware groups or go bankrupt
-those with backups paid ransoms 27 times less often

cyberpolice.gov.ua/news/infikuv...

11 months ago 38 9 1 0
Video
11 months ago 6177 875 37 22
Advertisement
Preview
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the stolen information is associated with valid online accounts. The technique has been codenamed precision-validating phishing by Cofense, which it said employs real-time email validation so that only a select set of high-value targets are served the fake login screens. "This tactic not
11 months ago 1 1 0 0
Preview
ASRGEN Access ASRGEN here on https://asrgen.streamlit.app/

🚨 New ASR rules are now GA:

❌ Block rebooting in Safe Mode
🕵️‍♂️ Block copied/impersonated system tools

ASRGEN had these since preview. 😎

Want to:

⚡ Quickly create Intune-ready ASR policies
🧪 Simulate and understand rule impacts

Check → asrgen.streamlit.app

Be proactive. Be precise.

11 months ago 2 1 0 0

I guess because like five of us are saying something, what was done to @thekrebscycle.bsky.social is an absolute injustice and a mockery of his selfless service.

America no longer supports or protects critical infrastructure defenders. I hope someone else appreciates him a lot more.

11 months ago 269 65 8 4
Preview
Eroding Foundations: The Precarious State of US Cyber Leadership US cybersecurity leadership is dangerously eroding as strategic policy gives way to the President's political grievances. Discover how these vindictive actions dismantle expertise and create critical ...

Recent developments in the US suggest a troubling shift away from expert-driven cyber defense towards political expediency. From sidelined Russia operations to gutted agencies, we examine the evidence and the potential global fallout.

Read our full analysis here: opalsec.io/eroding-foun...

11 months ago 0 0 0 0
Video

This should be obvious!

1 year ago 7000 2245 187 172

Their CEO had a full blown meltdown at the researchers for daring to assign a CVE - that ship sailed a while ago on them being one of "those organisations"

1 year ago 0 0 0 0