TomU | I'm still here... til the end ๐Ÿ•Š๏ธ๐Ÿ‡จ๐Ÿ‡ญ (@c_apt_ure) 's Twitter Profile
TomU | I'm still here... til the end ๐Ÿ•Š๏ธ๐Ÿ‡จ๐Ÿ‡ญ

@c_apt_ure

#InfoSec professional, husband & father of two (in random order). #BlueTeam #DFIR #APT #CTI #RedTeaming #BSidesZH (RT/Likes โ‰  endorsement) ๐Ÿ‘€โžก๏ธ#MalwareChallenge

ID: 205435856

linkhttp://c-apt-ure.blogspot.com/ calendar_today20-10-2010 21:56:04

15,15K Tweet

8,8K Followers

5,5K Following

Dave Jones (@eevblog) 's Twitter Profile Photo

IMPORTANT message for everyone using Gmail. You have been automatically OPTED IN to allow Gmail to access all your private messages & attachments to train AI models. You have to manually turn off Smart Features in the Setting menu in TWO locations. Retweet so every is aware.

IMPORTANT message for everyone using Gmail. 
You have been automatically OPTED IN to allow Gmail to access all your private messages & attachments to train AI models.  
You have to manually turn off Smart Features in the Setting menu in TWO locations.

Retweet so every is aware.
Olaf Hartong (@olafhartong) 's Twitter Profile Photo

#MDE custom collection is finally in public preview! It's a centrally managed solution to improve visibility and detection opportunities. We're releasing a management tool and rule repository in YAML format to share new rules with the community. medium.com/falconforce/miโ€ฆ

#MDE custom collection is finally in public preview! It's a centrally managed solution to improve visibility and detection opportunities. 

We're releasing a management tool and rule repository in YAML format to share new rules with the community.

medium.com/falconforce/miโ€ฆ
Steven Lim (@0x534c) 's Twitter Profile Photo

Azure Bastion CVE-2025-49752 ๐Ÿ‘€ CVSS Score: 10/10 Affected: All Azure Bastion deployments prior to the security update released on November 20, 2025 zeropath.com/blog/azure-basโ€ฆ

Steven Lim (@0x534c) 's Twitter Profile Photo

๐—ข๐˜‚๐˜๐—น๐—ผ๐—ผ๐—ธ ๐—ฆ๐˜๐—ฎ๐—ฟ๐˜๐˜‚๐—ฝ ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ถ๐˜€๐˜๐—ฒ๐—ป๐—ฐ๐—ฒ ๐˜ƒ๐—ถ๐—ฎ ๐—ฅ๐—ฒ๐—ด๐—ถ๐˜€๐˜๐—ฟ๐˜† ๐— ๐—ผ๐—ฑ๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป (T1112) Recent research (e.g., Splunkโ€™s NotDoor Insights) highlights that adversaries can achieve persistence in Microsoft Outlook by modifying the registry key

๐—ข๐˜‚๐˜๐—น๐—ผ๐—ผ๐—ธ ๐—ฆ๐˜๐—ฎ๐—ฟ๐˜๐˜‚๐—ฝ ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ถ๐˜€๐˜๐—ฒ๐—ป๐—ฐ๐—ฒ ๐˜ƒ๐—ถ๐—ฎ ๐—ฅ๐—ฒ๐—ด๐—ถ๐˜€๐˜๐—ฟ๐˜† ๐— ๐—ผ๐—ฑ๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป (T1112)

Recent research (e.g., Splunkโ€™s NotDoor Insights) highlights that adversaries can achieve persistence in Microsoft Outlook by modifying the registry key
Kostas (@kostastsale) 's Twitter Profile Photo

I just finished a big update for the EDR Telemetry website. Weโ€™re preparing for many exciting updates and want to make sure weโ€™re ready ๐Ÿ™‚ Check it out and let me know what you think - edr-telemetry.com

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

๐Ÿž Microsoft Confirms Windows 11 24H2 Update is Breaking Multiple Core Features Read more: cybersecuritynews.com/windows-11-24hโ€ฆ Microsoft has officially acknowledged a significant disruption affecting Windows 11 version 24H2 users, specifically after installing the cumulative update

๐Ÿž Microsoft Confirms Windows 11 24H2 Update is Breaking Multiple Core Features 

Read more: cybersecuritynews.com/windows-11-24hโ€ฆ

Microsoft has officially acknowledged a significant disruption affecting Windows 11 version 24H2 users, specifically after installing the cumulative update
Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

Someone going by "wwwiesel" on GitHub picked up Mike Mโ€™s tradition this year and dropped a full list of #BlackFriday deals in the #InfoSec space Online Courses & Training - 8kSec Academy - AI Security Professional Course - Altered Security - Belkasoft - Blu Raven Academy

Stephan Berger (@malmoeb) 's Twitter Profile Photo

A customer sent malware over. The file magic was CART.. What's that? Turns out, something pretty cool. "This is where CaRT (which stands for Compressed and RC4 Transport) comes in. CaRT is used to store and transfer malware, as well as its metadata. This is a product developed

A customer sent malware over. The file magic was CART.. What's that? Turns out, something pretty cool.

"This is where CaRT (which stands for Compressed and RC4 Transport) comes in. CaRT is used to store and transfer malware, as well as its metadata. This is a product developed
Jack Cable (@jackhcable) 's Twitter Profile Photo

๐Ÿšจ I made a simple tool to check if you're affected by the latest NPM worm. The Shai Hulud NPM worm is back, infecting over 27,000 GitHub repos and big name packages from Zapier, Posthog, Postman and others. Are you vulnerable? Check here: corridor.dev/shai-check

๐Ÿšจ I made a simple tool to check if you're affected by the latest NPM worm.

The Shai Hulud NPM worm is back, infecting over 27,000 GitHub repos and big name packages from Zapier, Posthog, Postman and others.

Are you vulnerable? Check here: corridor.dev/shai-check
ReversingLabs (@reversinglabs) 's Twitter Profile Photo

๐Ÿ‘€Blog with full details & more updates can be found here: reversinglabs.com/blog/another-sโ€ฆ #npm #OSS #SoftwareSupplyChainSecurity #Shaihulud Tomislav Pericin

Ben (@polygonben) 's Twitter Profile Photo

My first Huntress blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers. Big thanks to RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ for the help! ๐Ÿ˜‡ huntress.com/blog/clickfix-โ€ฆ

My first <a href="/HuntressLabs/">Huntress</a> blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers.

Big thanks to <a href="/RussianPanda9xx/">RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ</a> for the help! ๐Ÿ˜‡

huntress.com/blog/clickfix-โ€ฆ
Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

The SHA1-Hulud npm mess keeps growing, so we added additional detections for it today - new YARA rules by my colleague Marius Benthin in our public signature-base - cover bun_environment.js / setup_bun.js and the malicious preinstall script variants from the Wiz / Aikido

Stephan Berger (@malmoeb) 's Twitter Profile Photo

I was reading an older report from CrowdStrike the other day: "CrowdStrike was able to reconstruct the PowerShell script from the PowerShell Operational event log as the scriptโ€™s execution was logged automatically due to the use of specific keywords." [1] Which reminded me of

I was reading an older report from CrowdStrike the other day:

"CrowdStrike was able to reconstruct the PowerShell script from the PowerShell Operational event log as the scriptโ€™s execution was logged automatically due to the use of specific keywords." [1]

Which reminded me of
Matthew (@embee_research) 's Twitter Profile Photo

Quick walkthrough using CyberChef to decode a short .hta script from Malware Bazaar. 1. Extract encoded text using capture groups 2. Remove whitespace added by Cyberchef 3. Base64 decode the results Sample: bazaar.abuse.ch/sample/198aa2eโ€ฆ #malware #cyberchef

Quick walkthrough using CyberChef to decode a short .hta script from Malware Bazaar. 

1. Extract encoded text using capture groups
2. Remove whitespace added by Cyberchef
3. Base64 decode the results

Sample: bazaar.abuse.ch/sample/198aa2eโ€ฆ

#malware #cyberchef
Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Huntress researchers Anna Pham (RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ) & Ben Folland detail a multi-stage malware execution chain, originating from a ClickFix lure, that leads to the delivery of infostealing malware, including LummaC2 & Rhadamanthys. huntress.com/blog/clickfix-โ€ฆ

Huntress researchers Anna Pham (<a href="/RussianPanda9xx/">RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ</a>) &amp; Ben Folland detail a multi-stage malware execution chain, originating from a ClickFix lure, that leads to the delivery of infostealing malware, including LummaC2 &amp; Rhadamanthys. huntress.com/blog/clickfix-โ€ฆ
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

๐Ÿšจ Indirect-Shellcode-Executor Tool Exploits Windows API Vulnerability to Evade AV and EDR Source: cybersecuritynews.com/indirect-shellโ€ฆ A new offensive security tool developed in Rust is demonstrating a novel method for bypassing modern Endpoint Detection and Response (EDR) systems by

๐Ÿšจ Indirect-Shellcode-Executor Tool Exploits Windows API Vulnerability to Evade AV and EDR 

Source: cybersecuritynews.com/indirect-shellโ€ฆ

A new offensive security tool developed in Rust is demonstrating a novel method for bypassing modern Endpoint Detection and Response (EDR) systems by
Mehmet Ergene (@cyb3rmonk) 's Twitter Profile Photo

Cobalt Strike has a chokepoint that is great for robust detection. ๐Ÿ‘‡ #ThreatHunting #DetectionEngineering academy.bluraven.io/blog/detectingโ€ฆ

Stephan Berger (@malmoeb) 's Twitter Profile Photo

Reading a report from a recent Incident Response case from my teammate, Asger.jpg. "It was observed that an unknown hostname โ€œDESKTOP-LDIG48Nโ€ from the VPN DHCP IP address 192.168.128.149 made multiple failed login attempts using the username โ€œadminโ€ against various hosts

Cryptolaemus (@cryptolaemus1) 's Twitter Profile Photo

Results of a wonderful partnership among LEA across the world to make it a better place! We have come far since this all started eating mealybugs(Emotet).๐Ÿ™‚We are thankful for this partnership and to play a role in this to make a difference. We are a bit hungry though now... ๐Ÿค”