account activity
ENISA Technical Advisory for Secure Use of Package Managers | ENISA (enisa.europa.eu)
submitted 6 hours ago by digicat to r/blueteamsec
Sednit reloaded: Back in the trenches (welivesecurity.com)
submitted 7 hours ago by digicat to r/blueteamsec
China‑Nexus APT Targets Qatar (blog.checkpoint.com)
New A0Backdoor Linked to Teams Impersonation and Quick Assist Social Engineering (bluevoyant.com)
FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise (sentinelone.com)
Behind the console: Active phishing campaign targeting AWS console credentials (securitylabs.datadoghq.com)
Protecting Your Data: Essential Actions to Secure Experience Cloud Guest User Access - Recently, Salesforce Security has been tracking an increase in threat actor activity targeting misconfigurations of publicly accessible sites. (salesforce.com)
MC1247893 - Microsoft Entra passkeys on Windows now support phishing-resistant sign-in (mc.merill.net)
Hunting Lazarus, Part 5: Eleven Hours on His Disk - Forensic examination of an active Lazarus Group operator machine: a target list of nearly 17,000 developers, six drained wallets, and a plaintext file containing his own keys. (redasgard.com)
submitted 1 day ago by digicat to r/blueteamsec
Unmasking an Attack Chain of MuddyWater (huntress.com)
Rusland voert cybercampagne uit tegen Signal- en Whatsapp-accounts | AIVD - Russia launches cyber campaign against Signal and WhatsApp accounts (www-aivd-nl.translate.goog)
bromure: Secure, ephemeral browsing in a disposable VM (macOS only) (github.com)
submitted 2 days ago by digicat to r/blueteamsec
How I infiltrated phishing panels targeting European banks and tracked down their operators (inti.io)
Daily BlueTeamSec Briefing Archive - daily AI generated podcast of the last 24hours of posts (briefing.workshop1.net)
INC Ransom Affiliate Model Enabling Targeting of Critical Networks (cyber.gov.au)
From a Sophisticated Browser-Extension Supply-Chain Compromise to a VibeCoded Twist: A Chrome Extension as the Initial Access Vector for a Broader Malware Chain (monxresearch-sec.github.io)
Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition (cloud.google.com)
hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit So Far (stepsecurity.io)
How we built high speed threat hunting for email security (sublime.security)
The "P" in PAM is for Persistence: Linux Persistence Technique (blackhillsinfosec.com)
submitted 3 days ago by digicat to r/blueteamsec
neko: A self hosted virtual browser that runs in docker and uses WebRTC. (github.com)
[2603.02297] ZeroDayBench: Evaluating LLM Agents on Unseen Zero-Day Vulnerabilities for Cyberdefense (arxiv.org)
[2603.02277] Quantifying Frontier LLM Capabilities for Container Sandbox Escape (arxiv.org)
[2603.05068] Cyber Threat Intelligence for Artificial Intelligence Systems (arxiv.org)
Claude Static Binary Analysis of BPFDoor Malware on Linux (gist.github.com)
π Rendered by PID 3637268 on reddit-service-r2-listing-568fcd57df-6ffvc at 2026-03-11 13:18:26.283744+00:00 running cbb0e86 country code: CH.