Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

netresec@infosec.exchangeN

netresec@infosec.exchange

@netresec@infosec.exchange
About
Posts
7
Topics
2
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • https://krypt3ia.wordpress.com/2026/05/13/cyber-supply-chain-attacks-early-internet-to-today/ thing done.
    netresec@infosec.exchangeN netresec@infosec.exchange

    @cR0w @krypt3ia Here's a refresher on #Havex
    https://netresec.com/?b=14ABDA4

    Uncategorized

  • https://krypt3ia.wordpress.com/2026/05/13/cyber-supply-chain-attacks-early-internet-to-today/ thing done.
    netresec@infosec.exchangeN netresec@infosec.exchange

    @cR0w @krypt3ia The Havex backdoors by Energetic Bear / Dragonfly / Crouching Yeti from 2013 were also quite significant, and very under-reported on.

    Uncategorized

  • https://krypt3ia.wordpress.com/2026/05/13/cyber-supply-chain-attacks-early-internet-to-today/ thing done.
    netresec@infosec.exchangeN netresec@infosec.exchange

    @krypt3ia Great writeup! The visual chart with attacks grouped based on generation/method is also very interesting. Do the colors in the chart (red/orange/grey) represent something? Also, are the arrows in the chart to indicate the chronological order of various attacks -- or do they have some other meaning?

    Uncategorized

  • Proxying the Unproxyable – Sending EXE traffic to a Proxy https://isc.sans.edu/diary/32982
    netresec@infosec.exchangeN netresec@infosec.exchange

    @sans_isc Yay, proxifier to the rescue!

    Got a cool use for a tool like this? Give it a try and share your experiences [...]

    Proxifier is also useful when trying to intercept and decrypt TLS traffic from a Windows Sandbox.

    Uncategorized

  • #Mythos finds a #curl vulnerability
    netresec@infosec.exchangeN netresec@infosec.exchange

    @bagder LOL!

    The report concluded it found five “Confirmed security vulnerabilities”. I think using the term confirmed is a little amusing when the AI says it confidently by itself. Yes, the AI thinks they are confirmed, but the curl security team has a slightly different take.

    Link Preview Image
    Uncategorized mythos curl

  • Viewing #remcos alerts from FlowCarp in @ish's #EveBoxhttps://netresec.com/?b=2659fc0
    netresec@infosec.exchangeN netresec@infosec.exchange

    Viewing #remcos alerts from FlowCarp in @ish's #EveBox
    https://netresec.com/?b=2659fc0

    Uncategorized remcos evebox

  • New tool released: FlowCarp🔍 Identifies protocols without port numbers🔨 Build protocol detection from example traffic➡️ Input: PCAP or PcapNG⬅️ Output: Flows and/or Alertshttps://netresec.com/?b=265d268
    netresec@infosec.exchangeN netresec@infosec.exchange

    New tool released: FlowCarp
    🔍 Identifies protocols without port numbers
    🔨 Build protocol detection from example traffic
    ➡️ Input: PCAP or PcapNG
    ⬅️ Output: Flows and/or Alerts
    https://netresec.com/?b=265d268

    #FlowCarp

    Uncategorized flowcarp
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups