Ismael Valenzuela (@aboutsecurity) 's Twitter Profile
Ismael Valenzuela

@aboutsecurity

VP Threat Research & Intelligence @AWNetworks ▪️ Ex @Foundstone @Intel @McAfee @BlackBerry▪️ SANS Senior Instructor GSE #132 ▪️ #SEC530 #SEC568 #ThinkRedActBlue

ID: 45917439

linkhttp://aboutsecurity.io/ calendar_today09-06-2009 19:23:40

6,6K Tweet

18,18K Followers

9,9K Following

Mikhail Kasimov (@500mk500) 's Twitter Profile Photo

New #osx #amos stealer distribution domain, based on old "Brew" topic. brrewsh\.org raw.brrewsh\.org B: bazaar.abuse.ch/sample/20fac81… V: virustotal.com/gui/file/20fac…

New #osx #amos stealer distribution domain, based on old "Brew" topic.

brrewsh\.org
raw.brrewsh\.org

B: bazaar.abuse.ch/sample/20fac81…
V: virustotal.com/gui/file/20fac…
Ismael Valenzuela (@aboutsecurity) 's Twitter Profile Photo

⚡ As we highlight in our recent report "Leveraging Windows Defender Application Control (WDAC) to Block Dual-Use Application Abuse", nation‑state aligned actors (including Iran‑linked groups like MuddyWater and OilRig) are increasingly weaponizing legitimate tools for

Soroush Dalili (@irsdl) 's Twitter Profile Photo

🚨 1- CVE-2025-53770 is a variant of CVE-2025-49704 - a critical auth bypass in SharePoint's ToolPane.aspx endpoint. It lets attackers reach a page that can parse webparts without valid credentials, and with a chained deserialization bug, they can achieve RCE entirely in memory

Will (@bushidotoken) 's Twitter Profile Photo

Nothing too exciting by APT41 🇨🇳 here IMO, using Impacket, CobaltStrike, Mimikatz, Pillager, RawCopy, Neo-reGeorg Using a compromised SharePoint server for C2 is interesting I guess, especially with this new ToolShell exploit for SharePoint servers securelist.com/apt41-in-afric…

SANS Institute (@sansinstitute) 's Twitter Profile Photo

#ZeroTrust is complex. #AI helps simplify implementation. SANS’ Ismael Valenzuela (Ismael Valenzuela) breaks down predictive, generative & agentic AI in action. 📖 Read on The Hacker News: thehackernews.com/2025/07/assess…

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

The Arctic Wolf Labs team has uncovered a new campaign by APT group Dropping Elephant targeting major Turkish defense contractors and weapons manufacturers. Learn more in our latest blog: ow.ly/xLih50WueNn #HypersonicEspionage #TurkeyPakistan #DroppingElephant #Türkiye

Ismael Valenzuela (@aboutsecurity) 's Twitter Profile Photo

Right after disclosing financially motivated "Greedy Sponge's" campaign targeting organizations in #Mexico (arcticwolf.com/resources/blog…), our Arctic Wolf Labs team has identified a new campaign by cyber-espionage group #DroppingElephant targeting Turkish defense contractors,

Right after disclosing financially motivated "Greedy Sponge's" campaign targeting organizations in #Mexico (arcticwolf.com/resources/blog…), our <a href="/AWNetworks/">Arctic Wolf</a> Labs team has identified a new campaign by cyber-espionage group #DroppingElephant targeting Turkish defense contractors,
Team Cymru Threat Research (@teamcymru_s2) 's Twitter Profile Photo

Thanks for the report Arctic Wolf! Further connected infrastructure based on upstream traffic patterns: 2.56.127.158 - cypowertech[.]org 94.131.108.94 - techzcore[.]org (recent & potentially live campaign) All four IPs in the attached image were suspended THE.Hosting 🐉🤝🤖

Thanks for the report <a href="/AWNetworks/">Arctic Wolf</a>!

Further connected infrastructure based on upstream traffic patterns:

2.56.127.158 - cypowertech[.]org
94.131.108.94 - techzcore[.]org (recent &amp; potentially live campaign)

All four IPs in the attached image were suspended <a href="/the_hosting_/">THE.Hosting</a> 🐉🤝🤖
Marci McCarthy (@cisamarci) 's Twitter Profile Photo

🔐 New guidance for #SMEs: Microsegmentation in Zero Trust is here! Apply it across IT, OT, ICS & more to shrink attack surfaces, boost resilience & modernize networks.

Ismael Valenzuela (@aboutsecurity) 's Twitter Profile Photo

My latest talk on the practical application of AI in #cyberdefense is now live! 🔗 youtube.com/watch?v=HT3f66… This presentation was part of the SANS Institute “Secure Your Fortress” event back in April 2025, with 4,000 registrations and over 1,200+ live views from 76 countries.

Ismael Valenzuela (@aboutsecurity) 's Twitter Profile Photo

In late July 2025, we observed an increase in #ransomware activity targeting SonicWall firewalls for initial access. In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access. Ransomware groups often use

In late July 2025, we observed an increase in #ransomware activity targeting SonicWall firewalls for initial access. In the intrusions reviewed, multiple pre-ransomware intrusions were observed within a short period of time, each involving VPN access.

Ransomware groups often use
Ismael Valenzuela (@aboutsecurity) 's Twitter Profile Photo

“Thinking like a Red Teamer doesn’t mean becoming one, it means becoming a more dangerous defender.” That’s the heart of my #ThinkRedActBlue 🔴 🔵 philosophy, and I’m proud to see how well Galen Gough captured it after taking SANS Institute #SEC530. In his recent article, Galen

“Thinking like a Red Teamer doesn’t mean becoming one, it means becoming a more dangerous defender.”

That’s the heart of my #ThinkRedActBlue 🔴 🔵 philosophy, and I’m proud to see how well Galen Gough captured it after taking <a href="/SANSInstitute/">SANS Institute</a> #SEC530.

In his recent article, Galen