digicat@infosec.pubMEnglish · 6 days agoCTO at NCSC Summary: week ending March 1stplus-squarepinctoatncsc.substack.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCTO at NCSC Summary: week ending March 1stplus-squarepinctoatncsc.substack.comdigicat@infosec.pubMEnglish · 6 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 5 hours agoNorth Korea Tried to Hack Our CEO Through a Fake Job Interview on LinkedInplus-squareallsecure.ioexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNorth Korea Tried to Hack Our CEO Through a Fake Job Interview on LinkedInplus-squareallsecure.iodigicat@infosec.pubMEnglish · 5 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 10 hours agoFog, Proxies and Uncertainty: Cyber in US-Israeli Operations in Iranplus-squarewww.rusi.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFog, Proxies and Uncertainty: Cyber in US-Israeli Operations in Iranplus-squarewww.rusi.orgdigicat@infosec.pubMEnglish · 10 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 22 hours agojailer: Jailer is an eBPF-based process jailing system that provides mandatory access control (MAC) for Linux. It tracks processes using BPF task_storage maps and enforces role-based policiesplus-squaregithub.comexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkjailer: Jailer is an eBPF-based process jailing system that provides mandatory access control (MAC) for Linux. It tracks processes using BPF task_storage maps and enforces role-based policiesplus-squaregithub.comdigicat@infosec.pubMEnglish · 22 hours agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 22 hours agoInterplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East - Check Point Researchplus-squareresearch.checkpoint.comexternal-linkmessage-square0linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkInterplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East - Check Point Researchplus-squareresearch.checkpoint.comdigicat@infosec.pubMEnglish · 22 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 19 hours agoBrainworm - Hiding in Your Context Windowplus-squarewww.originhq.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBrainworm - Hiding in Your Context Windowplus-squarewww.originhq.comdigicat@infosec.pubMEnglish · 19 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 21 hours agoOffensive DPAPI With Nemesisplus-squarespecterops.ioexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkOffensive DPAPI With Nemesisplus-squarespecterops.iodigicat@infosec.pubMEnglish · 21 hours agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 1 day agoMicrosoft Entra ID Will Auto-Enable Passkey Profiles in March 2026plus-squarelazyadmin.nlexternal-linkmessage-square1linkfedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkMicrosoft Entra ID Will Auto-Enable Passkey Profiles in March 2026plus-squarelazyadmin.nldigicat@infosec.pubMEnglish · 1 day agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 1 day agoTracking CyberStrikeAI: AI-Native Offensive Tools & MSS Tiesplus-squarewww.team-cymru.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkTracking CyberStrikeAI: AI-Native Offensive Tools & MSS Tiesplus-squarewww.team-cymru.comdigicat@infosec.pubMEnglish · 1 day agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 1 day agoAnalysis of Confucius Group's Attacks Against Pakistan Deploying the AnonDoor Backdoormp.weixin.qq.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkAnalysis of Confucius Group's Attacks Against Pakistan Deploying the AnonDoor Backdoormp.weixin.qq.comdigicat@infosec.pubMEnglish · 1 day agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 1 day agoUnited States Leads Dismantlement of One of the World’s Largest Hacker Forumsplus-squarewww.justice.govexternal-linkmessage-square1linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkUnited States Leads Dismantlement of One of the World’s Largest Hacker Forumsplus-squarewww.justice.govdigicat@infosec.pubMEnglish · 1 day agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 1 day agoASPX_WebShell_COFFLoader: ASPX Web Shell with COFF Loaderplus-squaregithub.comexternal-linkmessage-square0linkfedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkASPX_WebShell_COFFLoader: ASPX Web Shell with COFF Loaderplus-squaregithub.comdigicat@infosec.pubMEnglish · 1 day agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 1 day agoDisruption targets Tycoon 2FA, popular AiTM PhaaSplus-squarewww.proofpoint.comexternal-linkmessage-square0linkfedilinkarrow-up13arrow-down11
arrow-up12arrow-down1external-linkDisruption targets Tycoon 2FA, popular AiTM PhaaSplus-squarewww.proofpoint.comdigicat@infosec.pubMEnglish · 1 day agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoA Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Socketsplus-squareblog.calif.ioexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkA Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Socketsplus-squareblog.calif.iodigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoSloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladeshplus-squarearcticwolf.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkSloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladeshplus-squarearcticwolf.comdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoInvestigating Suspected DPRK-Linked Crypto Intrusionsplus-squarectrlaltintel.comexternal-linkmessage-square0linkfedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkInvestigating Suspected DPRK-Linked Crypto Intrusionsplus-squarectrlaltintel.comdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 1 day agoIETF draft - AI Agent Authentication and Authorizationplus-squaredatatracker.ietf.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIETF draft - AI Agent Authentication and Authorizationplus-squaredatatracker.ietf.orgdigicat@infosec.pubMEnglish · 1 day agomessage-square0linkfedilink
digicat@infosec.pubMEnglish · 2 days agoInfected by GTA 5 Cheats: How an Infostealer Infection Unmasked a North Korean Agentplus-squarewww.infostealers.comexternal-linkmessage-square1linkfedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkInfected by GTA 5 Cheats: How an Infostealer Infection Unmasked a North Korean Agentplus-squarewww.infostealers.comdigicat@infosec.pubMEnglish · 2 days agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 2 days agoOAuth redirection abuse enables phishing and malware deliveryplus-squarewww.microsoft.comexternal-linkmessage-square1linkfedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkOAuth redirection abuse enables phishing and malware deliveryplus-squarewww.microsoft.comdigicat@infosec.pubMEnglish · 2 days agomessage-square1linkfedilink
digicat@infosec.pubMEnglish · 2 days agoFirst CHERIoT Silicon!plus-squarecheriot.orgexternal-linkmessage-square0linkfedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFirst CHERIoT Silicon!plus-squarecheriot.orgdigicat@infosec.pubMEnglish · 2 days agomessage-square0linkfedilink