Yesterday folks got a phishing email for a fake DMCA report-- myself included. Caught me at a good time so I could record poking at the scam and the malware it leads to: ultimately infostealer malware (the usual) from a fake domain & clearly AI slop site: piped.video/IzKjL16-sgY
Black Friday Comes Early 🦃 Code "BlackFriday25" active NOW for 25% off ALL courses on Just Hacking Training including Constructing Defense 2025! Excludes already discounted Bundles. Expires Nov 30 at Midnight ET.
There's an open role for a Staff CTI Analyst on my team here @HuntressLabs 📢💫
✨Do you love doing correlations between different incidents, sometimes digging into them, or doing malware analysis?
✨Do you like doing data analysis, and using this to make threat reports? 👇
Doing a bit of hunting on @ValidinLLC, let's see where I can get!
Looks like the IP address of the site a few days ago was 101.99.92[.]246. There are a number of other domains associated with this IP, as well:
The 2025 SANS #HolidayHack Challenge launched about an hour ago! Come have some fun building cybersecurity skills in this free @SANSInstitute gift to the community. sans.org/holidayhack
New micro-challenges, new gamified world, new music, new game dynamics! Check it out!
I had some time to work on the RE Rust Tickler challenges from @HuntressLabs recent CTF.
Specifically, I wanted to focus on @vector35 Binary Ninja's TTD implementation
Over weekend I made some quick write-ups on how I approached these easier challenges.
github.com/Rurik/CTF/tree/ma…
And a HUGE thank you to @runpanther for sponsoring this video! Take control of your security operations with Panther -- you can ditch legacy SIEMs and embrace an AI-driven, autonomous and engineer-first SOC platform and solution: jh.live/panther
Off the tails of a recent NightShade C2 writeup, experimenting with building a "UAC prompt bomb" (... best YouTube video title I could ask for 😅(plz dont ban me)) repeatedly asking for admin privileges -- short & sweet in just a line of PowerShell! Video: piped.video/JpWbytYrL2s
This looks like a super cool competition -- ginormous prize pool for one thing, and it's legitimate AI security, not just the cute stuff. And another staggered rollout style! Looks like it starts at the beginning of November with new content each week. Another to add to the list!
Gray Swan AI Arena sponsored by @hackthebox_eu present the Machine-in-the-Middle Challenge, a $100K competition exploring how humans & AI perform together in real offensive security scenarios.
Kinda wild we're in the last few days of the month and Huntress CTF is wrapping up soon 🤯
~11,672 players (new record)
~6,720 teams (new record)
Lots of challenges released throughout the month (including my personal favorite of the ones I created, "My Hawaii Vacation"😝), check back in if you haven't for some more malware, forensics, OSINT, reverse engineering, etc..
The feedback form is available now for folks who have been playing along with our month-long game. Player certificates will be available at the start of November. We will leave the infrastructure up for a week or so for folks to still have access for writeups or tasks they want to revisit.
If you haven't took a look back at the CTF for a bit, jump in before the end of the game! :) ctf.huntress.com
hey hi hello
we've been seeing summa dat WSUS sussy baka CVE-2025-59287 remote code execution exploitation
windows servers with WSUS ports 8530 & 8531 exposed ( -- why?) getting point-and-shoot popped from a POC already public
huntress.com/blog/exploitati…
prolly limited ITW exploitation because those ports shouldn't be exposed but 4 incidents so far from last night
patch your potatoes, IOCs and Sigma rule in da blog
Special thanks to @NotNordgaren for sharing cool knowledge, stories, and resources with #TISU cohort 7 and for helping to elevate our game this semester!!