BSides Luxembourg talk announcement!
π§π¨ π‘π’π§ π¦π’ πππ₯π πππ¦π¦: π§ππ ππππππ‘ πͺπ’π₯ππ π’π πππ‘π¨π« π£πππππ₯π¦ ππ‘π πππ§πππ§ππ’π‘ πππππππ‘πππ¦ - π ππ¦π¦ππ π’ πππ₯π§π’ππππ π‘οΈπ
Linux packers and loaders are a sneaky blind spot in cybersecurity. They hide code with encryption and obfuscation [β¦]
[Original post on infosec.exchange]
RobinReach
Happy Easter to those that celebrate!
From all at Huntbase β€οΈ
Never Hunt Alone
#CyberSecurity #InfoSec #ThreatHunting #HappyEaster
Originally from Unit 42: Weaponizing the Protectors: TeamPCPβs Multi-Stage Supply Chain Attack on Security Infrastructure ( :-{Δ±β #unit42 #threathunting #cyberresearch
Everyoneβs bragging about faster MTTR while attackers sit in SaaS via tokens and βtrustedβ OAuth apps. You donβt fix that with more alerts; you fix it with a small set of hunts you actually run.
#ThreatHunting #AlphaHunt
RobinReach
A new RSAC report maps eight phases of modern intrusions. One thing is consistent: attacks aren't at the perimeter anymore. They exploit the gap between what your tools see and what's actually happening.
That's a threat hunting problem.
#ThreatHunting #InfoSec #CyberSecurity
The cybersecurity certification landscape
negativepid.blog/the...
#defensiveSecurity #threatHunting #forensics #offensiveSecurity #ethicalHacking #cybersecurityCareers #cybersecurityCerts #certifications #Cybersecurity #ITcareers #onlineSecurity #negativepid
PART 2 is LIVE: open.substack.com/pub/manishra...
#Substack #Bluesky #Sysmon #Splunk #Cybersecurity #ThreatHunting #DetectionEngineering #APT29
Just Announced for BSides Luxembourg 2026!
πππ©ππ‘πππ π§ππ₯πππ§ ππ¨π‘π§ππ‘π: π¦π§ππ¬ππ‘π π’π‘π π¦π§ππ£ πππππ π’π πππ©ππ₯π¦ππ₯π¬ - Alex Holden
Cyber defenders must go beyond reactive security as attackers constantly evolve their tactics. This session dives into real-world attack [β¦]
[Original post on infosec.exchange]
Originally from Unit 42: Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government ( :-{Δ±β #unit42 #threathunting #cyberresearch
RobinReach
GlassWorm hides behind trusted dev accounts, legit services and a fake Google Docs extension. Every stage looks clean on its own. The attack only surfaces when you connect the dots.
That's a threat hunting problem.
#ThreatHunting #GlassWorm #InfoSec
Your SOC isnβt understaffedβitβs just fashionably late. While headlines scream disruption, attackers are still winning with OAuth, tokens, and βnormalβ exports. Revoking in 22 min beats writing a 22-page postmortem. π¨π
#AlphaHunt #CyberSecurity #ThreatHunting #IdentitySecurity
14 days later β Cerber ransomware.
Full hunt + IR report + every SPL query:
github.com/TensionFund/...
#cybersecurity #threathunting #splunk #infosec
Originally from Unit 42: Threat Brief: Recruiting Scheme Impersonating Palo Alto Networks Talent Acquisition Team ( :-{Δ±β #unit42 #threathunting #cyberresearch
RobinReach
90 zero-days exploited last year.
Nearly half targeted firewalls, VPNs and security appliances; devices that don't run endpoint detection.
Once compromised, they're invisible.
If your tools can't see it, you're already exposed.
Never Hunt Alone
#cybersecurity #threathunting
Originally from Unit 42: Google Authenticator: The Hidden Mechanisms of Passwordless Authentication ( :-{Δ±β #unit42 #threathunting #cyberresearch
Managed Detection and Response (MDR): Strengthening Cybersecurity with Proactive Threat Defense
Click here For More: qksgroup.com/market-resea...
#ManagedDetectionAndResponse #MDR #Cybersecurity #ThreatDetection #IncidentResponse #ThreatHunting #SecurityOperations #SOC #CyberThreats
DriverShield is live β a free platform for analyzing Windows kernel drivers (.sys) for vulnerabilities, rootkit behavior, and BYOVD attack patterns.
200+ drivers already analyzed through our 14-stage inspection pipeline. API Available.
drivershield.io
#infosec #cybersecurity #BYOVD #threathunting
ππ‘πππ¬ππ ππ‘π ππ¨π‘π§ ππ£π₯π ππ§π§ππππ¦ (2h Workshop) Rakesh Krishnan (@rakeshkrish12)
This workshop delivers a focused overview of advanced techniques for detecting and analyzing cyber threats from North Korea (DPRK). Participants will explore methods such as [β¦]
[Original post on infosec.exchange]
Risky Business #podcast risky.biz/RB827/ recently discussed Nebulock's #agentic #threathunting #framework that maintains a memory of previous hunts. Very clever use of #AI to support #security staff.
github.com/Nebulock-Inc...
Malwoverview v8.0 (codename: Revolutions)
Malwoverview v8.0 (codename: Revolutions) has been released:
github.com/alexandrebor...
To install its complete version: pip install malwoverview[all]
#threathunting #malware #vulnerability #ai #informationsecurity #cybersecurity #cve
Originally from Unit 42: Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization ( :-{Δ±β #unit42 #threathunting #cyberresearch
Just uploaded the 2nd Part of DLL Hijacking on #Substack
Where I analyzed real malware logs and discovered why non-admin users can execute code without triggering a single alert.
Link: substack.com/@manishrawat...
#Infosec #Detection #ThreatHunting #Splunk #Cybersecurity
Originally from Unit 42: Whoβs Really Shopping? Retail Fraud in the Age of Agentic AI ( :-{Δ±β #unit42 #threathunting #cyberresearch
Attackers donβt need malwareβjust your OAuth token. If you canβt revoke access in 30 min, congrats: youβre running a βmuseum SOC.β π₯ 3 kill-switches + a 90βday intel-led hunt loop cuts dwell time.
#AlphaHunt #CyberSecurity #ThreatHunting #IdentitySecurity
Originally from Unit 42: Analyzing the Current State of AI Use in Malware ( :-{Δ±β #unit42 #threathunting #cyberresearch
VEN0m ransomware uses BYOVD (IMFForceDelete.sys) to kill AV/EDR before encrypting files.
We provide a summary of the threat to help your teams from executive to analysts.
www.focusedhunts.com/blog/hunting...
#ThreatHunting #Ransomware #BYOVD #BlueTeam #FocusedHunts #HuntingOffTheRed #HOTR
Most #CTI programs describe the threat. Few can prove their defenses hold against it.
Nigel Boston wrote the CTI Fusion Playbook for doing exposure validation across #ThreatHunting, #Detection, #RedTeam, and #SOC, with a scoring model and templates included.
feedly.com/ti-essential...
Originally from Unit 42: Navigating Security Tradeoffs of AI Agents ( :-{Δ±β #unit42 #threathunting #cyberresearch
SOC Analyst Hub β Tier 1 bundles 5 playbooks, decision trees for alert classification/escalation, structured hunting hypotheses, and a 4βweek Tier 1 learning path. #ThreatHunting #IR #SOC https://bit.ly/4sYoieN
RobinReach
New blog from Jeff Hamm tracing threat hunting back to before the term even existed. What it really entails and why structure and frameworks matter now more than ever.
Never Hunt Alone
#ThreatHunting #CyberMarketing #InfoSecs #CyberSecurity
Blog Link in comments