Advertisement · 728 × 90

Posts by Mark

Post image Post image

Huntress continues to observe in-the-wild exploitation of CVE-2025-30406, a critical vulnerability in Gladinet CentreStack and Triofox

1 year ago 1 2 1 0
Preview
Detecting Fake CAPTCHA Campaigns: ClickFix, ClearFake, and Etherhide Summary

One of my good friends and former SOC protégé—dropping 🔥 analysis on a Monday afternoon. Epic work, @thecyber.dad 🚀

www.thecyber.dad/p/detecting-...

1 year ago 7 2 0 0
Post image

BREAKING.

From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sent out to CVE Board Members.

1 year ago 678 414 36 200
Post image Post image

cert.pl/uploads/docs... CERT Poland annual report.

1 year ago 0 0 0 0
Retro-style poster titled "Now You're Debugging with Power!" promoting the Sysinternals Suite by Microsoft. It depicts a smiling technician in a suit holding a wrench, standing before a futuristic control panel, with an atomic rocket illustration overhead. The poster lists various Sysinternals tools like Process Explorer, Autoruns, Proc Monitor, Diskmon, RAMMA, and VMMap, each humorously described with atomic-era metaphors, emphasizing their capabilities in Windows diagnostics. The visual style evokes mid-20th-century propaganda posters, using bold typography and a warm, vintage color palette.

Retro-style poster titled "Now You're Debugging with Power!" promoting the Sysinternals Suite by Microsoft. It depicts a smiling technician in a suit holding a wrench, standing before a futuristic control panel, with an atomic rocket illustration overhead. The poster lists various Sysinternals tools like Process Explorer, Autoruns, Proc Monitor, Diskmon, RAMMA, and VMMap, each humorously described with atomic-era metaphors, emphasizing their capabilities in Windows diagnostics. The visual style evokes mid-20th-century propaganda posters, using bold typography and a warm, vintage color palette.

Here is one for you: 50's/60's space atomic age ads.

1 year ago 38 8 1 0
Preview
Use one Virtual Machine to own them all — active exploitation of ESXicape A chain of three zero days allow threat actors to escape a Virtual Machine.

Update your VMware ESX farms ASAP.

There's an in the wild exploit chain being used which does VM -> Hypervisor escape, across all versions of ESXi. Allows full cluster access.

doublepulsar.com/use-one-virt...

1 year ago 59 29 3 2