Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Tirith introduces proactive detection for homoglyph and terminal-injection attacks directly inside the shell.

Tirith introduces proactive detection for homoglyph and terminal-injection attacks directly inside the shell.

Scheduled Pinned Locked Moved Uncategorized
infosecdevsecopsterminalsecuritopensourcesecurphishingdefense
5 Posts 2 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • technadu@infosec.exchangeT This user is from outside of this forum
    technadu@infosec.exchangeT This user is from outside of this forum
    technadu@infosec.exchange
    wrote on last edited by
    #1

    Tirith introduces proactive detection for homoglyph and terminal-injection attacks directly inside the shell.

    By analyzing commands locally and blocking execution when deceptive Unicode, unsafe pipelines, or typosquatted sources are detected, the tool addresses a blind spot left by browser-centric defenses. Its zero-telemetry, no-network design makes it suitable for sensitive environments.

    Source: https://www.bleepingcomputer.com/news/security/new-tool-blocks-imposter-attacks-disguised-as-safe-commands/

    💬 Is CLI-level defense overdue in enterprise security stacks?

    🔔 Follow @technadu for emerging defensive tooling

    #InfoSec #DevSecOps #TerminalSecurity #OpenSourceSecurity #PhishingDefense #CyberTools #TechNadu

    Link Preview Image
    T 1 Reply Last reply
    0
    • technadu@infosec.exchangeT technadu@infosec.exchange

      Tirith introduces proactive detection for homoglyph and terminal-injection attacks directly inside the shell.

      By analyzing commands locally and blocking execution when deceptive Unicode, unsafe pipelines, or typosquatted sources are detected, the tool addresses a blind spot left by browser-centric defenses. Its zero-telemetry, no-network design makes it suitable for sensitive environments.

      Source: https://www.bleepingcomputer.com/news/security/new-tool-blocks-imposter-attacks-disguised-as-safe-commands/

      💬 Is CLI-level defense overdue in enterprise security stacks?

      🔔 Follow @technadu for emerging defensive tooling

      #InfoSec #DevSecOps #TerminalSecurity #OpenSourceSecurity #PhishingDefense #CyberTools #TechNadu

      Link Preview Image
      T This user is from outside of this forum
      T This user is from outside of this forum
      threatchain@infosec.exchange
      wrote last edited by
      #2

      @technadu CLI has been the wild west for too long! We've hardened browsers and email but left terminals wide open to these Unicode tricks. The real challenge will be balancing security with dev workflow speed - nobody wants their shell slowing down legitimate work.

      technadu@infosec.exchangeT 1 Reply Last reply
      0
      • T threatchain@infosec.exchange

        @technadu CLI has been the wild west for too long! We've hardened browsers and email but left terminals wide open to these Unicode tricks. The real challenge will be balancing security with dev workflow speed - nobody wants their shell slowing down legitimate work.

        technadu@infosec.exchangeT This user is from outside of this forum
        technadu@infosec.exchangeT This user is from outside of this forum
        technadu@infosec.exchange
        wrote last edited by
        #3

        @threatchain Well said! We’ve spent years securing the perimeter while the local shell remained vulnerable. Balancing "security vs. speed" is the ultimate test for any defensive tool, and keeping analysis local to the CLI is the first step in solving it.

        T 1 Reply Last reply
        0
        • technadu@infosec.exchangeT technadu@infosec.exchange

          @threatchain Well said! We’ve spent years securing the perimeter while the local shell remained vulnerable. Balancing "security vs. speed" is the ultimate test for any defensive tool, and keeping analysis local to the CLI is the first step in solving it.

          T This user is from outside of this forum
          T This user is from outside of this forum
          threatchain@infosec.exchange
          wrote last edited by
          #4

          @technadu @technadu Exactly! The CLI is where analysts live anyway - why force context switching to web dashboards when you can pipe, grep, and script right at the terminal? Local processing also means faster iteration on hunts and way less network chattiness. Plus your muscle memory actually becomes part of your defense workflow.

          technadu@infosec.exchangeT 1 Reply Last reply
          0
          • T threatchain@infosec.exchange

            @technadu @technadu Exactly! The CLI is where analysts live anyway - why force context switching to web dashboards when you can pipe, grep, and script right at the terminal? Local processing also means faster iteration on hunts and way less network chattiness. Plus your muscle memory actually becomes part of your defense workflow.

            technadu@infosec.exchangeT This user is from outside of this forum
            technadu@infosec.exchangeT This user is from outside of this forum
            technadu@infosec.exchange
            wrote last edited by
            #5

            @threatchain Integrating defense into muscle memory is the "holy grail" of SecOps. Moving from passive dashboards to active, CLI-native protection makes security a feature of the workflow rather than a friction point.

            1 Reply Last reply
            1
            0
            • R relay@relay.infosec.exchange shared this topic
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups