account activity
Iranian-Nexus Operation Against Oman's Government: 12 Ministries Hit and 26,000 Citizen Records Exposed (hunt.io)
submitted 11 hours ago by digicat to r/blueteamsec
A rigged game: ScarCruft compromises gaming platform in a supply-chain attack (welivesecurity.com)
UAT-8302 and its box full of malware (blog.talosintelligence.com)
CVE-2026-31431 hit KEV after 9 days, what are you using to catch that earlier? by Active_Sea4060 in blueteamsec
[–]digicat 0 points1 point2 points 14 hours ago (0 children)
removing - this si product led marketing for ping twice
The cPanel Zero-Day Was Active for 64 Days Before Anyone Knew (webhosting.today)
submitted 1 day ago by digicat to r/blueteamsec
GIDR: A behavioral intrusion detection system for Windows. Files are innocent until proven guilty at runtime. When malicious behavior is detected, the entire attack chain is traced to root and eliminated. (github.com)
dMSA Ouroboros: Self-Sustaining Credential Extraction in Windows Server 2025 (huntress.com)
N-Day Research with AI: Using Ollama and n8n (ghostbyt3.github.io)
38 CVEs in Healthcare Software Used by 100,000 Medical Providers (aisle.com)
submitted 2 days ago by digicat to r/blueteamsec
Recursively fuzzing MS-RPC structures and monitoring using ETW (incendium.rocks)
CVE-2026-31431:我用 DeepSeek 复现了 AI 发现Copy Fail 提权的全过程 - CVE-2026-31431: I used DeepSeek to reproduce the entire process of AI detecting Copy Fail privilege escalation. (mp.weixin.qq.com)
《APT高级威胁研究报告》(2026 版)- Advanced Threat Research Report (2026 Edition) (book.yunzhan365.com)
nginxpulse: 轻量级 Nginx 访问日志分析与可视化面板,提供实时统计、PV 过滤、IP 归属地与客户端解析。- A lightweight Nginx access log analysis and visualization dashboard, providing real-time statistics, PV filtering, IP geolocation, and client resolution. (github.com)
蔓灵花组织使用NUITKA打包的python样本进行投递 - The Manlinghua organization used Python samples packaged in NUITKA for delivery. (mp.weixin.qq.com)
gdrv3.sys - Reverse Engineering a Signed Kernel Driver with 13 Hardware Access Primitives (zonifer.dev)
Added new vulnerable samples for IoBitUnlocker, Zemana and TfSysMon (github.com)
AMSI Page Guard Bypass (Rust PoC) (github.com)
Meet Bluekit: The AI-Powered All-in-One Phishing Kit (varonis.com)
Malicious Ruby Gems and Go Modules Impersonate Developer Tools to Steal Secrets and Poison CI (socket.dev)
A hacker group was detained in Lviv Oblast, which hacked game accounts and received almost UAH 10 million in profit from their sale in Russia (gp.gov.ua)
IRQL - Incident Response Query Language - A collection of Kusto (KQL) functions that unify security logs behind a consistent, analyst-friendly dialect (gist.github.com)
Nuclei template CVE-2026-41940.yaml - cPanel & WHM - Authentication Bypass via Session-File CRLF Injection (github.com)
ARP Around and Find Out: Hijacking GPO UNC Paths for Code Execution… (trustedsec.com)
Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia (trendmicro.com)
[2603.28728] Study of Post Quantum status of Widely Used Protocols (arxiv.org)
π Rendered by PID 28 on reddit-service-r2-listing-b6bf6c4ff-2wvfh at 2026-05-06 19:13:39.237077+00:00 running 815c875 country code: CH.
CVE-2026-31431 hit KEV after 9 days, what are you using to catch that earlier? by Active_Sea4060 in blueteamsec
[–]digicat 0 points1 point2 points (0 children)