If you start reading just 5 CTF write-ups a day, by the end of this year, you'll be 10x more skilled than you are today. Just start, rn!
That's 150 write-ups in a month. Assuming you learn 30–40 unique techniques from them, no course can match that. You'll be unstoppable.
Microsoft Rolls Out New Security Assessment: Remove Inactive Service Accounts!
Organizations that fail to secure their dormant user accounts leave the door unlocked to their sensitive data.
Malicious actors, much like thieves, often look for the easiest and quietest way into…
I found that using RegQueryMultipleValuesW to read sensitive registry values bypasses nearly all the EDRs I tested.
Alongside NtOpenKeyEx with OpenOptions 0x04, you can read Windows secrets without touching the disk and without SYSTEM.
More here:
sud0ru.ghost.io/silent-harvest…
Hi Friends! We continue our series of articles about RPC and impacket. In the second part, we looked at tools that can be used to analyze RPC servers, and also examined RPC security issues : )
cicada-8.medium.com/impacket-devel…
Just pushed my latest BYOVD read and write primitive PoCs to GitHub. The repo includes proof of concept code for evading different types of defenses.
github.com/0xJs/BYOVD_rea…
Thanks to everyone who joined my DEFCON33 talk!🎉
For those of you who missed it and are interested in seeing how we can extract cleartext credentials and bypass MFA directly from the official Microsoft login page, I just uploaded the recording to YouTube:
youtu.be/z6GJqrkL0S0
Launching now — a new blog for research from @AnthropicAI’s Frontier Red Team and others.
> red.anthropic.com
We’ll be covering our internal research on cyber, bio, autonomy, national security and more.
🔥 I've been talking about IIS modules for a while now 🗣️
The Splunk Threat Research Team just released our blog around CVE-2025-53770 SharePoint attacks and how some adversaries are using IIS modules for persistence 💀
🎯 Ways to hunt and gather these sneaky DLLs
🔍 Detection…
Relatively easy detection for this in #KQL using Event ID 5145 in the Security Event Log if you send it to a SIEM (like #MicrosoftSentinel).
github.com/SecurityAura/D…
There are potentially other detection opportunities, maybe one with MDE using PnPDeviceAllowed ...
Relatively easy detection for this in #KQL using Event ID 5145 in the Security Event Log if you send it to a SIEM (like #MicrosoftSentinel).
github.com/SecurityAura/D…
There are potentially other detection opportunities, maybe one with MDE using PnPDeviceAllowed ... https://t.co/fvLe1WDnc9
🚨 New table alert for hashtag#AdvancedHunting in hashtag#DefenderXDR: GraphApiAuditEvents (Preview)
Track Microsoft Entra ID API calls to Graph API—see who accessed what, when, and how. Perfect for auditing Graph API usage & spotting anomalies.🫡
learn.microsoft.com/en-us/defender…
🚀 **Kanvas** - my new open-source project !!
If you're in IR, Forensics, or part of a SOC dealing with security incidents/ breaches, , Give it a spin and let me know what you think 🤞
Quick writeup 📌 findevil.io/Kanvas-page/
Github Repo 📌 github.com/WithSecureLabs…
0 Followers 93 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/pRRveiln3A
2K Followers 7K FollowingI Dreams inspires 🗽 I Financial Freedom 💰 | Real Estate 🏡 I Work from Home 🏠 I Digital Entrepreneur 🅱️ I Crypto and Stock Agent 📈
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
2K Followers 2K FollowingThe Cyber Distortion Podcast covers all of today's relevant topics related to anything and everything in the world of Cybersecurity. Our opinions are our own!
173 Followers 163 Following#Cybersecurity 🌐 and #EthicalHacking 👨🏻💻 Tip's and Trick's and Blogs on our Website. 🤟 #follow4followback #follow4followbackinstantly #follow4follow
195K Followers 14K FollowingWe help professionals acquire the skills, knowledge and certificates by teaching defense through offense to advance their careers in cybersecurity.
23K Followers 21K FollowingExperienced #Unix and #Linux #SysAdmin with over twenty years background in Systems Analysis, Problem Resolution, Application Support, and Process #Automation.
1K Followers 3K FollowingCurator of the Pop-Up & Hands-On #BadgeLife Museum where you can play with the hacker badges! From the people who brought you the https://t.co/qysHcTF0qj
2K Followers 888 FollowingInfrastructure security automation platform for Linux and Windows. Create and manage your own security model across cloud and on-premises environment.
3K Followers 2K FollowingLock enthusiast, red team director, amateur astronomer. Employer will deny my existence. Support your local trash pandas. #carpenoctem #redteam
2K Followers 366 FollowingMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Go. This account is owned and run by tool creator @Ne0nd0g
5K Followers 3 FollowingCloudflare TV is a global destination for engaging conversations and unique perspectives from the technology leaders who are helping to build a better Internet.
45K Followers 123 FollowingHave questions, or building something cool with Cloudflare's Developer products? We're here to help. For help with your account please try @CloudflareHelp
229K Followers 5K FollowingCloudflare is the world’s leading #ConnectivityCloud, and we have our eyes set on an ambitious goal — to help build a #BetterInternet.
5K Followers 1K FollowingHelping you escape your crappy job & transition into an exciting cybersecurity career in only 2 hrs/day | LinkedIn Learning instructor | Career coach
4K Followers 48 FollowingCe compte n’est pas surveillé jour et nuit, et ne sert pas de plateforme de signalement.
Follow us in English: @CyberCentre_ca
7K Followers 1K FollowingDr Ian Stanier Buckingham Centre for Security & Intelligence Studies. NPCC IPRC. #HUMINT. Lead PG CERT https://t.co/NFhkxnCa3k & MA https://t.co/0cyYJzjzl8
13K Followers 10K FollowingMost companies only realise they are breached when informed by a 3rd party. This is a stupid problem! Thinkst Canary. Know. When it Matters.
6K Followers 3K FollowingHunt & Response Senior Manager @HuntressLabs || "Competition is the law of the jungle, but cooperation is the law of civilisation” - Kropotkin
2K Followers 2K FollowingThe Cyber Distortion Podcast covers all of today's relevant topics related to anything and everything in the world of Cybersecurity. Our opinions are our own!
172 Followers 44 FollowingThe demoparty going from NYC to Montréal via Amtrak train! ==== Jan 17, 2020: Kickoff, NYC ==== Jan 18, 2020: Train + compos in Montréal
925 Followers 367 FollowingElectrical engineer by trade, with tinkering in anything electronic, mechanical, and radio based. Into everything from ham radio to 3d printing...
31K Followers 33 FollowingThe CEO Coach | CEO of the Year '19 | McKinsey, Skype | Author | Follow for posts about business, leadership & self-mastery. Join +235,000 subscribe below:
342K Followers 48 FollowingOne of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.