PART 2 is LIVE: open.substack.com/pub/manishra...
#Substack #Bluesky #Sysmon #Splunk #Cybersecurity #ThreatHunting #DetectionEngineering #APT29
AI Agents Are Reshaping Cyber Threats, Making Traditional Kill Chains Less Relevant #aiagents #Anthropic #APT29
Hunted through 196,071 APT29 logs in #Splunk. Process creation had 449 events. Memory access had 39,286. APT29 was nearly invisible at the layer most detections watch.
Still working through the lateral movement and credential access layers. Link is in comments.
#substack #Cybersecurity #bsky #APT29
🚨 #Internet var uger fra at bryde totalt sammen igennem #Linux #Fedora bagdør.
#APT29 #hacking
Softwaren styrer servere, banker, mobiler & statslige it. #OpenSource
Det blev opdaget ved en tilfældighed af en tysk programmør #AndresFreund ( #postgresql) fra #Microsoft.
youtu.be/aoag03mSuXQ?...
The APTs That Defined 2025 open.substack.com/pub/malwhere...
#APT #China #Russia #DPRK #Iran #ThreatIntel #CyberSecurity #SaltTyphoon #FlaxTyphoon #MustangPanda #APT17 #APT28 #APT29 #Sandworm #LazarusGroup #Kimsuky #APT42
I just published Catching APT29’s Favorite Evasion Trick: Detecting DLL Sideloading with Sigma (T1574.002) devsecopsai.today/catching-apt...
#Cybersecurity #CISO #APT29 #Sigma #Evasion #Published #Detection #Threat #Medium #Blog #Bluesky #bsky #Analysis
I just published How I Built a Sigma Detection Rule to Catch APT29’s Encoded PowerShell Attacks systemweakness.com/how-i-built-...
#Apt29 #Cybersecurity #ThreatHunting #Threat #Hunting #SIGMA #Sysmon #Medium #Blog #Bluesky #CISO #CTO
They're called "cozy" because they're in no hurry: once they enter a system, they stay there for months undetected, gathering intel from sensitive targets. This is how Russia spies on the West.
#APT29 #cozyBear #espionage #Russia #cyberwarfare
iT4iNT SERVER SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny VDS VPS Cloud #Cybersecurity #SolarWinds #SEC #SupplyChainAttack #APT29
APT29 shopped the OAuth device-code aisle and served .RDP phish 🎣 Amazon/Microsoft/Cloudflare cut the power—temporarily. Upgrade MFA 🔒 choke consent, fence RDP.
Curious? Tap in now and subscribe for the next move.
blog.alphahunt.io/russian-apts...
#AlphaHunt #CyberSecurity #APT29 #InfoSec
OAuth is the new skeleton key: Russian APTs consent-grab, RDP-phish, and shrug off takedowns. 🔐🇷🇺 Get the playbook—and a risk edge—before they log in as you.
Read more + subscribe -> blog.alphahunt.io/russian-apts...
#AlphaHunt #CyberSecurity #APT29 #OAuth
Russian APTs moved from love letters to .rdp lures and device-code OAuth theft—then Amazon/Microsoft/Cloudflare pulled the plug. 🔌🛡️ Log tells + quick wins inside: blog.alphahunt.io/russian-apts...
#AlphaHunt #CyberSecurity #APT29 #OAuth
Russian APTs raided the OAuth device-code aisle and mailed weaponized .rdp invites. Amazon+Microsoft+Cloudflare clipped dwell time. Want the fixes (FIDO2, consent lock)? 🔒🕵️
#AlphaHunt #CyberSecurity #APT29 #OAuth
“Approve to own yourself.” APT29 hijacked device-code OAuth and booby-trapped .rdp—until Amazon/Microsoft/Cloudflare yanked the cord. Kill legacy auth, go FIDO2, govern consent. Read more 👀
#AlphaHunt #CyberSecurity #APT29
Russian APTs didn’t “hack” in—OAuth held the door while a “helpful” .rdp arrived. Then Amazon/Microsoft/Cloudflare played whack‑a‑mole with takedowns. 🔐⚡
Get the playbook—subscribe: -> blog.alphahunt.io/russian-apts...
#AlphaHunt #CyberSecurity #APT29 #InfoSec
Cozy Bear’s new trick: fake device-code popups. The clouds tag-teamed the takedown. Watch for app-consent spikes + weird device-code grants, then kill legacy auth. Breakdown 🔐🧹
#AlphaHunt #CyberSecurity #APT29 #CloudSecurity
Cozy Bear moved from “.rdp phish” to “fake device-code popups.” The clouds finally played defense together. Check device-code grants + app consents—then kill legacy auth. 🔐🧹
👇 blog.alphahunt.io/russian-apts...
Read & subscribe for detections. #AlphaHunt #CyberSecurity #APT29
Amazon Disrupts Russian Hacking Campaign Targeting Microsoft Users The Midnight Blizzard cyberspies used compromised websites to trick users into authorizing devices they controlled. The post Amazo...
#Cloud #Security #Identity #& #Access #APT29 #Cozy #Bear […]
[Original post on securityweek.com]
Amazon disrupts watering hole campaign by Russia’s APT29 aka Cozy Bear
aws.amazon.com/blogs/securi...
#CyberSecurity #NationState #Putin #APT29 #CozyBear
Amazon has disrupted a Russian #APT29 watering hole campaign that used compromised websites to target Microsoft’s device code authentication.
Read: hackread.com/amazon-disru...
#CyberSecurity #CyberAttack #Russia #Amazon #Microsoft
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication reconbee.com/amazon-disru...
#Amazon #APT29 #wateringholecampaign #microsoft #authentication #cyberattack
Amazon ferma campagna watering-hole di APT29: redirect offuscati imitano la verifica Microsoft, blocco domini con Cloudflare e Microsoft.
#Amazon #apt29 #Microsoft #wateringhole
www.matricedigitale.it/2025/08/31/a...
⚠️ APT29’s watering hole trick uncovered
#Amazon disrupted a watering‑hole campaign by Russia’s #APT29, who hijacked legitimate websites to redirect 10% of visitors into a malicious #Microsoft device‑code auth flow, tricking them into granting unauthorized access.
#ransomNews #APT29 #AuthPhishing
Russia’s #APT29 hacked legit websites—secretly redirecting ~10% of visitors into fake “Cloudflare” pages to hijack Microsoft accounts.
Amazon flagged and disrupted the campaign, but the group quickly spun up new domains. #CyberSecurity thehackernews.com/2025/08/amaz...
Amazon disrupts APT29's latest cyber espionage campaign exploiting Microsoft's device code authentication. Stay vigilant against evolving threats. #CyberSecurity #APT29 #Phishing #AmazonSecurity Link: thedailytechfeed.com/amazon-thwar...
Russian Threat Actors Circumvent Gmail Security with App Password Theft #APT29 #CyberCrime #Cybersecurity