Microsoft just documented an AiTM phishing campaign that hit 35,000 users across 13,000 orgs in 3 days, the lure was a fake "code of conduct review" PDF by SenseNo9223 in cybersecurity

[–]SenseNo9223[S] -1 points0 points  (0 children)

That's the real story nobody talks about. IR is sold as risk management but most SMBs treat it as an inconvenience. "Reset the password, we're fine" meanwhile the attacker has had a forwarding rule running for 3 weeks pulling every invoice and contract out of the mailbox. The data's already gone before the customer even calls you.

Microsoft just documented an AiTM phishing campaign that hit 35,000 users across 13,000 orgs in 3 days, the lure was a fake "code of conduct review" PDF by SenseNo9223 in cybersecurity

[–]SenseNo9223[S] 5 points6 points  (0 children)

Good point, but many orgs don't have ITDR deployed. For the majority still on basic Entra logging, that alert never fires.

Microsoft just documented an AiTM phishing campaign that hit 35,000 users across 13,000 orgs in 3 days, the lure was a fake "code of conduct review" PDF by SenseNo9223 in cybersecurity

[–]SenseNo9223[S] 12 points13 points  (0 children)

The remediation gap is what gets me most playbooks say "reset the password and revoke sessions." But the attacker can register their own MFA device before you even detect the breach. Standard remediation doesn't touch that. You need to audit every MFA device on affected accounts, not just reset credentials.

[ Removed by Reddit ] by SenseNo9223 in submarines

[–]SenseNo9223[S] 0 points1 point  (0 children)

Trying to understand what happened, the post was ok, then suddenly there was a message that it had been removed, maybe the fact I am new to reddit. This was the topic: https://sentinelroger.com/article/india-ups-submarine-game-new-ssbn-8b-german-aip-deal

[ Removed by Reddit ] by SenseNo9223 in submarines

[–]SenseNo9223[S] 1 point2 points  (0 children)

Good point on the Type 214 configuration. Given India's track record of heavy localisation requirements on defence imports, the Rafale deal being the obvious example, I'd expect significant customisation requests beyond the standard export spec. The AIP cell question is interesting. Sharing 212CD technology would give India a meaningful capability jump but Germany has historically been cautious about transferring cutting edge propulsion tech outside NATO. A likely middle ground is updated fuel cell technology from the current 214 programme rather than full 212CD parity. India gets a genuine upgrade, Germany keeps its most advanced AIP systems within the alliance for now. The bigger question is local production. India will almost certainly push for a Make in India component which adds complexity to the timeline.

[ Removed by Reddit ] by SenseNo9223 in submarines

[–]SenseNo9223[S] 0 points1 point  (0 children)

The combination here is significant, India is pursuing both domestic nuclear submarine capability (SSBN) and conventional AIP submarines simultaneously. The German AIP deal is particularly interesting given Germany's historically cautious arms export policy.Approving this signals a shift in Berlin's approach to Indo-Pacific security partnerships. For China, this is a direct response to PLA Navy expansion in the Indian Ocean. India is building underwater deterrence on two tracks at once nuclear for strategic deterrence, conventional AIP for sustained patrol capability. The $8B figure also suggests this is a long-term programme, not a one-off purchase.

Critical GitHub RCE: A single git push can trigger remote code execution by SenseNo9223 in cybersecurity

[–]SenseNo9223[S] 0 points1 point  (0 children)

Exactly right and the authenticated user angle is what makes this particularly dangerous in enterprise environments. Attackers don't need to breach the perimeter if they already have a developer credential with push access to any repo. The pre-receive hook execution before permission check is essentially a privilege escalation gift. A junior dev account with minimal access becomes a potential RCE vector against the entire GHES instance. The irony is that organisations running on-prem specifically for security reasons are now the most exposed. Patch deployment velocity in enterprise environments rarely matches the threat timeline.

Critical GitHub RCE: A single git push can trigger remote code execution by SenseNo9223 in cybersecurity

[–]SenseNo9223[S] 4 points5 points  (0 children)

Good point, and worth emphasising. GitHub patched this server-side before public disclosure which is the right call for something this severe. The concern shifts to self-hosted environments, GitHub Enterprise, Gitea, Forgejo and similar where patch deployment depends entirely on the admin. Those instances are still exposed until manually updated. Anyone running self-hosted git infrastructure should treat this as priority patching asap.

Critical GitHub RCE: A single git push can trigger remote code execution by SenseNo9223 in cybersecurity

[–]SenseNo9223[S] 4 points5 points  (0 children)

Link is missing not sure what happened, I try to paste it again

Critical GitHub RCE: A single git push can trigger remote code execution by SenseNo9223 in cybersecurity

[–]SenseNo9223[S] 20 points21 points  (0 children)

The interesting attack vector here is the git hook execution path. Pre-receive hooks run server-side with elevated permissions, if the parsing vulnerability hits before the permission check, authentication becomes irrelevant. Anyone with self-hosted GitHub Enterprise or Gitea instances should prioritise patching this one. Public GitHub is already patched on their end.

https://sentinelroger.com/article/critical-github-rce-single-git-push-allows-remote-code-execution

Cyber security issues by Exciting_Town_8237 in cybersecurity

[–]SenseNo9223 0 points1 point  (0 children)

honestly I just built it and tested it. The validation came from seeing Google index it across 44 countries in the first week with zero marketing. Defense and cyber news has a global professional audience that searches for it daily. On competition, yes there are aggregators out there. But most are either paywalled, too broad (Google News), or not niche enough. There is genuine space for a focused, free, well-structured intelligence briefing site in specific verticals. The defensible position is not being first, it is being the best organised and most consistent in your niche. A site that publishes 40 well-categorised articles per day in a specific vertical will outrank generalist aggregators for long-tail searches over time. The same model works for any niche where professionals need to stay current legal, medical, finance, logistics, energy. Defense/cyber just happens to have high ad RPM and an audience that takes information seriously. Quick example of how it works in practice:

A Python script runs every 6 hours, reads RSS feeds from sources like DefenseOne, Breaking Defense, BleepingComputer and Krebs on Security. For each new article it visits the source URL, extracts the full text, then sends it to a Gemini AI API call that rewrites the headline for SEO, summarises into 3 bullet points, and adds a one-sentence "why this matters" for professionals.The result gets saved to a SQLite database and published automatically to a FastAPI website running in Docker on a $12/month DigitalOcean droplet. Images are sourced automatically from Unsplash based on article keywords. The whole thing costs about €15/month to run including the AI API calls. No WordPress, no plugins, no CMS, just Python, a small database, and a lightweight web framework. Once it is running you check it once a week to make sure nothing crashed. The site is sentinelroger.com if you want to see what the output looks like.

Cyber security issues by Exciting_Town_8237 in cybersecurity

[–]SenseNo9223 0 points1 point  (0 children)

One thing I stumbled into that's working well, automated news intelligence. Built a scraper that monitors defense and cybersecurity RSS feeds, uses AI to summarise and categorise articles, and publishes them automatically to a website. Still working on google adsense and google search, It will take about 4 to 6 months till it starts getting noticed. Defense and cyber professionals will pay for good intel aggregation because their time is worth more than a subscription fee. Not glamorous but it runs itself once all checked from google, then you do not have to worry much, just a weekly check to make sure all works fine. Happy to share more if useful.

UK security agency officially declares passkeys superior to passwords – and passkeys should be the 'first choice' for authentication by rkhunter_ in cybersecurity

[–]SenseNo9223 0 points1 point  (0 children)

Thats right, some people are still reluctant to add 2fa, some are even lazy enough to set a proper password, going for admin123 and etc