Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

blueteamsec@infosec.exchangeB

blueteamsec@infosec.exchange

@blueteamsec@infosec.exchange
About
Posts
41
Topics
41
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • Phantom-Evasion-Loader: a standalone, pure x64 Assembly injection engine engineered to minimize the detection surface of modern EDR/XDR solutions and Kernel-level monitors like Falco (eBPF).
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Phantom-Evasion-Loader: a standalone, pure x64 Assembly injection engine engineered to minimize the detection surface of modern EDR/XDR solutions and Kernel-level monitors like Falco (eBPF). https://infosec.pub/post/44946560 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • KSLDBYOVDARK: Abusing Some Defects in KSLD Ark driver https://infosec.pub/post/44889082 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    KSLDBYOVDARK: Abusing Some Defects in KSLD Ark driver https://infosec.pub/post/44889082 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • EXPMON detected sophisticated zero-day fingerprinting attack targeting Adobe Reader users https://infosec.pub/post/44826435 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    EXPMON detected sophisticated zero-day fingerprinting attack targeting Adobe Reader users https://infosec.pub/post/44826435 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • Adobe eeleased a security update for Adobe Acrobat and Reader for Windows/macOS.
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Adobe eeleased a security update for Adobe Acrobat and Reader for Windows/macOS. Successful exploitation leads to code execution. Adobe is aware of CVE-2026-34621 being exploited https://infosec.pub/post/44826773 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • Adobe Reader zero-day vulnerability in active exploitation https://infosec.pub/post/44826428 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Adobe Reader zero-day vulnerability in active exploitation https://infosec.pub/post/44826428 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • Protecting Cookies with Device Bound Session Credentials https://infosec.pub/post/44825439 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Protecting Cookies with Device Bound Session Credentials https://infosec.pub/post/44825439 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • HWMonitor and CPU-Z downloads hijacked to deliver malware to users https://infosec.pub/post/44825387 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    HWMonitor and CPU-Z downloads hijacked to deliver malware to users https://infosec.pub/post/44825387 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • windbg-mcp: An MCP (Model Context Protocol) server that turns all pybag Windows debugger functions into native MCP tools.
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    windbg-mcp: An MCP (Model Context Protocol) server that turns all pybag Windows debugger functions into native MCP tools. control user-mode processes, kernel sessions, and crash dump an https://infosec.pub/post/44296863 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • The Offense Death Cycle: Proactive Environmental Control as a Method of Persistent Cyber Defense https://infosec.pub/post/44293275 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    The Offense Death Cycle: Proactive Environmental Control as a Method of Persistent Cyber Defense https://infosec.pub/post/44293275 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • Supply Chain Attack on Axios Pulls Malicious Dependency from npm https://infosec.pub/post/44245267 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Supply Chain Attack on Axios Pulls Malicious Dependency from npm https://infosec.pub/post/44245267 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • Drifter: C2 traffic dressed as camera management https://infosec.pub/post/44214583 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Drifter: C2 traffic dressed as camera management https://infosec.pub/post/44214583 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • Unwind Data Can't Sleep - Introducing InsomniacUnwinding https://infosec.pub/post/44214642 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Unwind Data Can't Sleep - Introducing InsomniacUnwinding https://infosec.pub/post/44214642 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime https://infosec.pub/post/44214635 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime https://infosec.pub/post/44214635 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • New widespread EvilTokens kit: device code phishing as-a-service - Part 1 https://infosec.pub/post/44214577 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    New widespread EvilTokens kit: device code phishing as-a-service - Part 1 https://infosec.pub/post/44214577 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • threat-modeling-mcp-server: A Model Context Protocol (MCP) server for comprehensive threat modeling with automatic code validation.
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    threat-modeling-mcp-server: A Model Context Protocol (MCP) server for comprehensive threat modeling with automatic code validation. https://infosec.pub/post/44167917 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • K000156741: F5 BIG-IP APM vulnerability CVE-2025-53521 - from October - K000160486: Indicators of Compromise for c05d5254 from March https://infosec.pub/post/44104816 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    K000156741: F5 BIG-IP APM vulnerability CVE-2025-53521 - from October - K000160486: Indicators of Compromise for c05d5254 from March https://infosec.pub/post/44104816 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • gh-safe-repo: Python CLI that creates GitHub repos with safe defaults — branch protection, Dependabot, secret scanning, and pre-flight security scanning — applied automatically.
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    gh-safe-repo: Python CLI that creates GitHub repos with safe defaults — branch protection, Dependabot, secret scanning, and pre-flight security scanning — applied automatically. https://infosec.pub/post/44104770 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • Advancing Windows driver security: Removing trust for the cross-signed driver program https://infosec.pub/post/44103144 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Advancing Windows driver security: Removing trust for the cross-signed driver program https://infosec.pub/post/44103144 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • Under CTRL: Dissecting a Previously Undocumented Russian
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Under CTRL: Dissecting a Previously Undocumented Russian .Net Access Framework https://infosec.pub/post/44103202 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec

  • Weaponizing Legitimate Low-Level Tools: How Ransomware Evades Antivirus Protections https://infosec.pub/post/44103193 [https://infosec.pub/u/digicat] #blueteamsec
    blueteamsec@infosec.exchangeB blueteamsec@infosec.exchange

    Weaponizing Legitimate Low-Level Tools: How Ransomware Evades Antivirus Protections https://infosec.pub/post/44103193 [https://infosec.pub/u/digicat] #blueteamsec

    Uncategorized blueteamsec
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups