Advertisement ยท 728 ร— 90

Posts by Cyb3rint3l Labs

with anything else.

Things are changing; they always do.

Gear up your defenses, be consistent, take a good note of what's changing and try to keep up reasonably and practically. (4/4)

#cybersecurity #claude #mythos #cyb3rint3l

5 days ago 0 0 0 0

engineering laptops containing administrative credentials for numerous deployments in plain text, usage of legacy software, no patch management and absence of any kind of monitoring to name a few.

We first need to make sure to follow the basics, build on defense in-depth & take it from there (3/4)

5 days ago 2 0 3 0

However, proven cybersecurity principles won't just change overnight.

We need to remember that the most prominent cyber attacks up until now had come as a result of poor cyber hygiene practices aka partially or even completely omitting the basics on some occasions.

Wide-open RDP services, (2/4)

5 days ago 0 0 1 0

There's a lot of noise lately about Anthropic's Mythos.

Its said capabilities are impressive and it appears this to be the case for the most part. We could be witnessing history rewriting in regards to pace acceleration from vulnerability discovery to much faster exploitation. (1/4)

5 days ago 0 0 1 0
A picture with white background and red top banner displays information on Claude Status.

A picture with white background and red top banner displays information on Claude Status.

Oh, my!

#claude

6 days ago 1 0 0 0

In this video, we issue the below five commands:

- nslookup
- set type=mx, example[dot]com
- set type=ns, example[dot]com
- set type=txt, example[dot]com
- _dmarc.example[dot]com

1 week ago 0 0 0 0

The below two commands are issued in Windows PowerShell as part of this video:

โœ… Get-FileHash
โœ… New-Item & Rename-Item

1 week ago 0 0 0 0
Advertisement
Cryptographic Hashes - How To Check!
Cryptographic Hashes - How To Check! YouTube video by Cyb3rint3l Labs

โœ… Cryptographic Hashes - How To Check!

How do you know if a file is safe or tampered with? In this video, we go through verifying file integrity in Windows using cryptographic hashes.

youtube.com/shorts/w_WYl...

1 week ago 0 0 1 0

I don't think they hate it. They surely do not prioritise it.

1 week ago 1 0 0 0
Find DNS records in seconds!
Find DNS records in seconds! YouTube video by Cyb3rint3l Labs

How to find #DNS records in seconds!

In this video we go through some NSLOOKUP commands for basic #OSINT helping us to discover DNS records using the terminal in seconds.

This is applicable in both #Windows and #Linux environments.

youtube.com/shorts/N4rOq...

1 week ago 0 0 1 0

That's right!

1 week ago 0 0 0 0

3) Use Mistral for comparison purposes (e.g logs, datasets).

This way, you will get a two-fold win: you will save yourself a fair amount of quota usage while having your work validated against three major LLMs.

(2/2)

#Gemini #openai #Mistral #LLM

1 week ago 0 0 1 0

#Claude quota usage and limits are lately out of control. A piece of advice for those seeing their quota gone in just a few prompts.

1) Use Claude only for the main intended purpose you chose it (e.g. to help you with code).

2) Use Gemini for all other tasks; mainly for reasoning and logic.

(1/2)

1 week ago 2 0 1 0

(4/4) 5) Protect your backups. Always prioritise immutable or air-gapped backups over sets that can be easily tampered with or destroyed.

3 weeks ago 0 0 0 0

(3/4) 4) Lock down RDP. Turn off RDP connections where they aren't strictly needed. Yes, even on the internal network. This is critical for backup servers. If you can log in with just one click, adversaries can too (and, spoiler alert, they will). Security over convenience.

3 weeks ago 0 0 1 0

(2/4) 2) Clean up your software inventory. Leaving a temporary "PuTTY/WinSCP" installation sitting on your server post-upgrade is not a good idea.

3) Stop saving credentials. Never save passwords or UNC paths locally, especially on servers. Yes, enter them again if you have to.

3 weeks ago 0 0 1 0

(1/4) I've been asked lately how cybersecurity can still be straightforward despite all the industry noise.

Ensure that you do not omit the basics:

1) Consolidate your browsers. You don't need 4 different browsers on one system. Stick to one or two at most & use profiles to separate your tasks.

3 weeks ago 0 0 1 0
Advertisement
Dashboard view of the Windows Server Security Audit tool showing NIS2 alignment grade, critical issues, warnings, passed checks, total checks, and compliance by security domain with color-coded bars.

Dashboard view of the Windows Server Security Audit tool showing NIS2 alignment grade, critical issues, warnings, passed checks, total checks, and compliance by security domain with color-coded bars.

I've released an open-source PowerShell tool for Windows Server Security Audits.

Features

โœ… Alignment with EUs NIS2 (Art. 21)
โœ… Maps to MITRE ATT&CK & CIS v8
โœ… Weighted Risk Scoring & HTML/JSON Reports

I'd love to have your feedback!

๐Ÿ”— https:https://github.com/cyb3rint3l-labs/ServerSecurityAudit

3 months ago 3 1 0 0
โš ๏ธ OPT OUT from LinkedIn's Change That Will Use Your Data for AI Training
โš ๏ธ OPT OUT from LinkedIn's Change That Will Use Your Data for AI Training YouTube video by cyb3rint3l

๐—Ÿ๐—ฎ๐˜€๐˜ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ ๐˜๐—ผ ๐˜๐˜‚๐—ฟ๐—ป ๐—ถ๐˜ ๐—ผ๐—ณ๐—ณ!

#linkedin #aitraining #dataprotection

youtube.com/shorts/CQ-Pd...

5 months ago 1 0 0 0

๐Ÿ“Œ What youโ€™ll learn in this video:

- How to use Process Monitor for real-time file, registry, and process activity

- How to leverage Autoruns to detect malware persistence and TCPView for network connections

- How to combine these tools to get actionable Threat Intelligence

6 months ago 1 0 0 0
Threat Hunting with Sysinternals โ€“ Learn Live Windows Forensics (ProcMon, Autoruns, TCPView)
Threat Hunting with Sysinternals โ€“ Learn Live Windows Forensics (ProcMon, Autoruns, TCPView) YouTube video by cyb3rint3l

In this second part of the "Threat Hunting with Sysinternals" series, designed for SOC Analysts, Blue Teamers and System/Network administrators, we explore Process Monitor, Autoruns and TCPView.

youtu.be/VgWSUKVUUfU

6 months ago 1 0 1 0
Post image

Largest NPM supply chain attack in history. Attackers compromised 18 core JavaScript packages with 2+ billion weekly downloads after phishing a maintainer. Malware targets crypto wallets & steals credentials. Millions of developers affected worldwide www.aikido.dev/blog/npm-deb...

7 months ago 23 14 2 2
Post image

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/7

7 months ago 64 44 2 14
Post image

The new Bloodhound version has some genuinely crazy cool new features -- OpenGraph really blows the doors off the potential for Bloodhound to not just map attack paths within Microsoft Active Directory or Entra ID tenants, but now... ANYTHING ๐Ÿคฉ youtu.be/kVOjXGbm_Ro

8 months ago 8 2 1 0
Post image Post image Post image Post image

SpiderFoot is one of the tools I've used most in my OSINT journey so far.

I highly recommend it!

#osint #cyb3rint3l #cybersecurity #osintseries #digitalfootprint #infosec #spiderfoot #reconnaissance #shodan #virustotal

8 months ago 3 0 0 0
CISA openโ€sources Thorium malware forensic platform In a bid to aid cyber defenders, CISA has released Thoriumโ€”a free, openโ€source malware forensic analysis platform. Designed to streamline the integration of automated threat investigation tools, the platform aims to ease the strain on security teams tackling an ever-increasing volume ofโ€ฆ

CISA openโ€sources Thorium malware forensic platform.
https://deadstack.net/cluster/11364
๐Ÿ”—๐Ÿ”ฅ Stories follow in replies.
#tech #opensource #infosec #government #cybersecurity

8 months ago 2 1 0 0
Advertisement
Preview
US woman jailed for stealing identities to give North Koreans jobs Over $17m raised from the scheme was sent directly to North Korea's nuclear programme, US officials say.

That's...wild!

www.bbc.com/news/article...

8 months ago 1 0 0 0

No six-figure #cybersecurity solution will save you if:

โŒ You haven't trained your users
โŒ You save RDP credentials on the client
โŒ Force UNC paths to remember login details
โŒ You lack a Patch Management strategy
โŒ You are not incorporating Monitoring
โŒ You assume you are too small to be hit

8 months ago 1 0 0 0

LOL

9 months ago 0 0 0 0

Thanks!

9 months ago 0 0 0 0