Skip Navigation

Posts
282
Comments
15
Joined
2 yr. ago

blueteamsec @infosec.pub

Demystifying threat intelligence in digital advertising - includes their own pyramid of pain

blueteamsec @infosec.pub

Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem

blueteamsec @infosec.pub

From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira

blueteamsec @infosec.pub

Exorcism: The first open source runtime windows batch and command line deobfuscator

blueteamsec @infosec.pub

IOCTL_VOLSNAP_DELETE_SNAPSHOT: Querying And Deleting Shadow Copies Using The IOCTL_VOLSNAP_QUERY_NAMES_OF_SNAPSHOTS & IOCTL_VOLSNAP_DELETE_SNAPSHOT IOCTLs

blueteamsec @infosec.pub

Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives

blueteamsec @infosec.pub

BSides Las Vegas - live streams - Mon, Tue and Wed

blueteamsec @infosec.pub

SQUID-2025:1 Buffer Overflow in URN Handling

blueteamsec @infosec.pub

Quantum networking technologies - "we provide an updated analysis of QKD as a security technology, and the development of QRNGs. We also consider the future of quantum networking technologies."

blueteamsec @infosec.pub

EntraGoat - A Deliberately Vulnerable Entra ID Environment

blueteamsec @infosec.pub

Tracing ToneShell: Mustang Panda's Evolving Tradecraft and Campaign Infrastructure

blueteamsec @infosec.pub

APT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoor

blueteamsec @infosec.pub

Protecting the Evidence in Real-Time with KQL Queries - "monitoring for attempts to modify the corresponding registry keys can help us generate early alerts and detect potential tampering."

blueteamsec @infosec.pub

DHS Launches Over $100 Million in Funding to Strengthen Communities’ Cyber Defenses | CISA

blueteamsec @infosec.pub

PlayPraetor's evolving threat: How Chinese-speaking actors globally scale an Android RAT

blueteamsec @infosec.pub

How to automatically disable users in AWS Managed Microsoft AD based on GuardDuty findings

blueteamsec @infosec.pub

Investigating Suspicious Memory Activity: Tracing a SIEM Alert to a Cobalt Strike C2

blueteamsec @infosec.pub

Memory Forensics Attack Simulation Dataset - " a curated memory forensics dataset designed to support research, detection engineering, and hands-on training in the fields of malware analysis, incident

blueteamsec @infosec.pub

암호화폐 거래소로 위장한 페이스북 광고에 의한 악성코드 유포 - Malware spread through Facebook ads disguised as cryptocurrency exchanges.

blueteamsec @infosec.pub

malefic: IoM implant, C2 Framework and Infrastructure - use seen in the wild