Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

hackerworkspace@infosec.exchangeH

hackerworkspace@infosec.exchange

@hackerworkspace@infosec.exchange
About
Posts
66
Topics
65
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • Dark Web Profile: Keymous+
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Dark Web Profile: Keymous+

    Just a moment...

    favicon

    (socradar.io)

    Read on HackerWorkspace: https://hackerworkspace.com/article/dark-web-profile-keymous

    #malware #databreach #cybersecurity

    Uncategorized malware databreach cybersecurity

  • 73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation

    Link Preview Image
    73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation

    Attackers can compromise systems in minutes while patching and response still take hours or days. Picus Security breaks down why autonomous validation is becoming critical for modern defense strategies.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Read on HackerWorkspace: https://hackerworkspace.com/article/73-seconds-to-breach-24-hours-to-patch-the-case-for-autonomous-validation

    #cybersecurity #aisecurity #vulnerability

    Uncategorized cybersecurity aisecurity vulnerability

  • Canvas Maker Instructure Reaches Agreement With Cybercriminals
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Canvas Maker Instructure Reaches Agreement With Cybercriminals

    Link Preview Image
    Canvas Maker Instructure Reaches Agreement With Cybercriminals

    Instructure says it reached an agreement with ShinyHunters over the Canvas breach data

    favicon

    Infosecurity Magazine (www.infosecurity-magazine.com)

    Read on HackerWorkspace: https://hackerworkspace.com/article/canvas-maker-instructure-reaches-agreement-with-cybercriminals

    #ransomware #databreach #incidentresponse

    Uncategorized ransomware databreach incidentrespons

  • EntryPoint Hijacking
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    EntryPoint Hijacking

    Link Preview Image
    EntryPoint Hijacking

    The technique of EntryPoint Hijacking introduces a stealthier approach to code injection, as it doesn’t rely on API calls that create a new thread within the process context, and it is independent of the attack chain. Arbitrary code is written to memory, but it executes only when the process legitimately creates a new thread. This…

    favicon

    Purple Team (ipurple.team)

    Read on HackerWorkspace: https://hackerworkspace.com/article/entrypoint-hijacking

    #malware #cybersecurity #exploit

    Uncategorized malware cybersecurity exploit

  • Think AI agents are risky?
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Think AI agents are risky? Your underlying stack is too | RL Blog

    Link Preview Image
    Think AI agents are risky? Your underlying stack is too | RL Blog

    To manage risk from agentic AI use, organizations need to focus more on the infrastructure they run on.

    favicon

    ReversingLabs (www.reversinglabs.com)

    Read on HackerWorkspace: https://hackerworkspace.com/article/think-ai-agents-are-risky-your-underlying-stack-is-too-rl-blog

    #cybersecurity #aisecurity #vulnerability

    Uncategorized cybersecurity aisecurity vulnerability

  • Shai-Hulud: Another Wave and Going Open Source
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Shai-Hulud: Another Wave and Going Open Source

    Link Preview Image
    Shai-Hulud: Another Wave and Going Open Source

    Shai-Hulud - the self-propagating npm/PyPI supply-chain worm - is now open source on GitHub, and copycats are already forking it. If your detection strategy depends on recognizing this specific malware, you've lost the next round. The right question is how to detect stolen credentials being used abnormally - invariant across every variant past and future.

    favicon

    (www.stream.security)

    Read on HackerWorkspace: https://hackerworkspace.com/article/shai-hulud-another-wave-and-going-open-source

    #malware #cybersecurity #authentication

    Uncategorized malware cybersecurity authentication

  • Mystery Microsoft bug leaker keeps the zero-days coming
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Mystery Microsoft bug leaker keeps the zero-days coming

    Link Preview Image
    Mystery Microsoft bug leaker keeps the zero-days coming

    Security pros warn YellowKey claim could make stolen laptops a much bigger problem

    favicon

    theregister (www.theregister.com)

    Read on HackerWorkspace: https://hackerworkspace.com/article/mystery-microsoft-bug-leaker-keeps-the-zero-days-coming

    #databreach #vulnerability #exploit

    Uncategorized databreach vulnerability exploit

  • Windows BitLocker zero-day gives access to protected drives, PoC released
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Windows BitLocker zero-day gives access to protected drives, PoC released

    Link Preview Image
    Windows BitLocker zero-day gives access to protected drives, PoC released

    A cybersecurity researcher has published proof-of-concept (PoC) exploits for two unpatched Microsoft Windows vulnerabilities named YellowKey and GreenPlasma, which are a BitLocker bypass and a privilege-escalation flaw.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Read on HackerWorkspace: https://hackerworkspace.com/article/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released

    #encryption #vulnerability #exploit

    Uncategorized encryption vulnerability exploit

  • Gamaredon's infection chain: Spoofed emails, GammaDrop and GammaLoad
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Gamaredon's infection chain: Spoofed emails, GammaDrop and GammaLoad

    Link Preview Image
    Gamaredon's infection chain: Spoofed emails, GammaDrop and GammaLoad

    Identifier: TRR260501. Summary Investigating Gamaredon’s abuse of CVE-2025-8088, we identified a dozen waves of spearphishing emails against Ukrainian state institutions in a campaign that is still active, dating back to September 2025. These emails – spoofed or sent from compromised government accounts – deliver persistent, multi-stage VBScript downloaders that profile the infected system. In the […]

    favicon

    HarfangLab (harfanglab.io)

    Read on HackerWorkspace: https://hackerworkspace.com/article/gamaredon-s-infection-chain-spoofed-emails-gammadrop-and-gammaload

    #malware #cybersecurity #vulnerability

    Uncategorized malware cybersecurity vulnerability

  • [DxBP] Part 1 - Technical Detection Engineering Best Practices
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    [DxBP] Part 1 - Technical Detection Engineering Best Practices

    Link Preview Image
    [DxBP] Part 1 - Technical Detection Engineering Best Practices

    Part 1 of the Detection Engineering Best Practices series focuses on the technical foundations of building high quality detections. While examples are written in KQL for Microsoft Sentinel and Defender XDR, the challenges and best practices discussed—such as ingestion delays, identifier usage, joins, evasion-resistant logic, and entity mapping—apply broadly to SIEM and EDR platforms including Splunk, CrowdStrike Falcon, and SentinelOne.

    favicon

    Microsoft Security Blogs - Kusto (kqlquery.com)

    Read on HackerWorkspace: https://hackerworkspace.com/article/dxbp-part-1-technical-detection-engineering-best-practices

    #cybersecurity #incidentresponse #threatintelligence

    Uncategorized cybersecurity incidentrespons threatintellige

  • Hackers accessed BWH Hotels reservation system for months
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Hackers accessed BWH Hotels reservation system for months

    https://securityaffairs.com/192038/data-breach/hackers-accessed-bwh-hotels-reservation-system-for-months.html

    Read on HackerWorkspace: https://hackerworkspace.com/article/hackers-accessed-bwh-hotels-reservation-system-for-months

    #databreach #incidentresponse #privacy

    Uncategorized databreach incidentrespons privacy

  • Foxconn confirms cyberattack after ransomware crew claims it stole confidential Apple, Nvidia files
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Foxconn confirms cyberattack after ransomware crew claims it stole confidential Apple, Nvidia files

    Link Preview Image
    Foxconn confirms cyberattack after ransomware crew claims it stole confidential Apple, Nvidia files

    Affected factories back up and running, we're told

    favicon

    theregister (www.theregister.com)

    Read on HackerWorkspace: https://hackerworkspace.com/article/foxconn-confirms-cyberattack-after-ransomware-crew-claims-it-stole-confidential-apple-nvidia-files

    #ransomware #databreach #cybersecurity

    Uncategorized ransomware databreach cybersecurity

  • Accelerating detection engineering using AI-assisted synthetic attack logs generation | Microsoft Security Blog
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Accelerating detection engineering using AI-assisted synthetic attack logs generation | Microsoft Security Blog

    https://www.microsoft.com/en-us/security/blog/2026/05/12/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation/

    Read on HackerWorkspace: https://hackerworkspace.com/article/accelerating-detection-engineering-using-ai-assisted-synthetic-attack-logs-generation-microsoft-security-blog

    #cybersecurity #incidentresponse #threatintelligence

    Uncategorized cybersecurity incidentrespons threatintellige

  • Proxying the Unproxyable?
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Proxying the Unproxyable? Sending EXE traffic to a Proxy

    https://isc.sans.edu/diary/rss/32982

    Read on HackerWorkspace: https://hackerworkspace.com/article/proxying-the-unproxyable-sending-exe-traffic-to-a-proxy

    #malware #encryption #cybersecurity

    Uncategorized malware encryption cybersecurity

  • SANS Stormcast Wednesday, May 13th, 2026: Microsoft Patch Tuesday; Large npm/pypi Compromise; R…
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    SANS Stormcast Wednesday, May 13th, 2026: Microsoft Patch Tuesday; Large npm/pypi Compromise; R…

    https://www.youtube.com/watch?v=aUficRwDQ6s

    #malware #vulnerability #securitypatch

    Uncategorized malware vulnerability securitypatch

  • SANS Stormcast Wednesday, May 13th, 2026: Microsoft Patch Tuesday; Large npm/pypi Compromise; Rubygems Attack
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    SANS Stormcast Wednesday, May 13th, 2026: Microsoft Patch Tuesday; Large npm/pypi Compromise; Rubygems Attack

    Link Preview Image
    SANS Stormcast Wednesday, May 13th, 2026: Microsoft Patch Tuesday; Large npm/pypi Compromise; Rubygems Attack

    SANS Stormcast Wednesday, May 13th, 2026: Microsoft Patch Tuesday; Large npm/pypi Compromise; Rubygems Attack , Author: Dr. Johannes B. Ullrich Cybersecurity Podcast

    favicon

    SANS Internet Storm Center (isc.sans.edu)

    Read on HackerWorkspace: https://hackerworkspace.com/article/sans-stormcast-wednesday-may-13th-2026-microsoft-patch-tuesday-large-npm-pypi-compromise-rubygems-attack

    #malware #vulnerability #exploit

    Uncategorized malware vulnerability exploit

  • Seedworm: Iran-Linked Hackers Breached Korean Electronics Maker in Global Spying Campaign
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Seedworm: Iran-Linked Hackers Breached Korean Electronics Maker in Global Spying Campaign

    https://www.security.com/threat-intelligence/iran-seedworm-electronics

    Read on HackerWorkspace: https://hackerworkspace.com/article/seedworm-iran-linked-hackers-breached-korean-electronics-maker-in-global-spying-campaign

    #malware #databreach #cybersecurity

    Uncategorized malware databreach cybersecurity

  • Researchers open-source a Wi-Fi cyber range for security training - Help Net Security
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Researchers open-source a Wi-Fi cyber range for security training - Help Net Security

    https://www.helpnetsecurity.com/2026/05/13/wi-fi-cyber-range-security/

    Read on HackerWorkspace: https://hackerworkspace.com/article/researchers-open-source-a-wi-fi-cyber-range-for-security-training-help-net-security

    #cybersecurity #authentication #vulnerability

    Uncategorized cybersecurity authentication vulnerability

  • VICE: Cyberwar | Full Season 2 | Blueprint
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    VICE: Cyberwar | Full Season 2 | Blueprint

    https://www.youtube.com/watch?v=0KmB3u7ydP0

    #cybersecurity #privacy #threatintelligence

    Uncategorized cybersecurity privacy threatintellige

  • Sorry.
    hackerworkspace@infosec.exchangeH hackerworkspace@infosec.exchange

    Sorry.

    - YouTube

    Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.

    favicon

    (www.youtube.com)

    #cybersecurity #authentication #penetrationtesting

    Uncategorized cybersecurity authentication penetrationtest
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups