maldevel ☣ (@maldevel) 's Twitter Profile
maldevel ☣

@maldevel

code, pentest, redteam, research

ID: 74949316

linkhttps://github.com/maldevel calendar_today17-09-2009 06:23:00

26,26K Tweet

8,8K Takipçi

661 Takip Edilen

Logisek (@logisekict) 's Twitter Profile Photo

#Command and #Control in #Cyber #Attacks During an #intrusion, control over compromised systems will be established by adversaries through Command and Control (#C2) techniques. Communication will be initiated carefully to blend with normal traffic, aiming to bypass detection.

#Command and #Control in #Cyber #Attacks

During an #intrusion, control over compromised systems will be established by adversaries through Command and Control (#C2) techniques. Communication will be initiated carefully to blend with normal traffic, aiming to bypass detection.
Logisek (@logisekict) 's Twitter Profile Photo

#Ransomware: Should You Pay? Should You Be Ready? Ransomware attacks continue to evolve in scale and sophistication, crippling operations across sectors. Paying the ransom might seem like the fastest solution—but law enforcement strongly discourages it. Why? $ No guarantees:

#Ransomware: Should You Pay? Should You Be Ready?

Ransomware attacks continue to evolve in scale and sophistication, crippling operations across sectors. Paying the ransom might seem like the fastest solution—but law enforcement strongly discourages it. Why?

$ No guarantees:
Logisek (@logisekict) 's Twitter Profile Photo

The Hidden Exit - How Adversaries Quietly #Steal Your Data When a breach occurs, data theft is rarely immediate. Once sensitive information has been gathered, attackers must quietly move it out of the compromised environment, without triggering alarms. This phase, known as

The Hidden Exit - How Adversaries Quietly #Steal Your Data

When a breach occurs, data theft is rarely immediate. Once sensitive information has been gathered, attackers must quietly move it out of the compromised environment, without triggering alarms. This phase, known as
Logisek (@logisekict) 's Twitter Profile Photo

#Hardening Your Digital Backbone - The Role of #Security #Configuration #Audits Security configuration #audits have become an indispensable layer of defense. Whether it's #Windows environments, #cloud infrastructures, or #networked assets, misconfigurations remain one of the

#Hardening Your Digital Backbone - The Role of #Security #Configuration #Audits

Security configuration #audits have become an indispensable layer of defense. Whether it's #Windows environments, #cloud infrastructures, or #networked assets, misconfigurations remain one of the
Logisek (@logisekict) 's Twitter Profile Photo

Rethinking #Network #Segmentation - A #Business Centric #Security #Strategy In modern enterprise environments, network segmentation and segregation should be treated as fundamental #security measure rather than optional enhancement. When aligned with business functions, Virtual

Rethinking #Network #Segmentation - A #Business Centric #Security #Strategy

In modern enterprise environments, network segmentation and segregation should be treated as fundamental #security measure rather than optional enhancement. When aligned with business functions, Virtual
Logisek (@logisekict) 's Twitter Profile Photo

#Proactive #Security #Assessments - A Necessity, Not a Luxury #CyberRisks are no longer hypothetical, they are a daily operational reality. Proactive security assessments such as penetration testing are essential for organizations that aim to not only withstand cyber threats,

#Proactive #Security #Assessments - A Necessity, Not a Luxury

#CyberRisks are no longer hypothetical, they are a daily operational reality. Proactive security assessments such as penetration testing are essential for organizations that aim to not only withstand cyber threats,
Logisek (@logisekict) 's Twitter Profile Photo

Why #Businesses Must #Invest in #Penetration #Testing The threat landscape continues to expand, with #cybercriminals targeting organizations of all sizes. A single data breach will not merely compromise sensitive information, it will severely damage business reputation, result

Why #Businesses Must #Invest in #Penetration #Testing

The threat landscape continues to expand, with #cybercriminals targeting organizations of all sizes. A single data breach will not merely compromise sensitive information, it will severely damage business reputation, result
Logisek (@logisekict) 's Twitter Profile Photo

The Smartest #Investment in #Cybersecurity? Penetration Testing Cybersecurity breaches are no longer hypothetical, they are inevitable. While many organizations remain reactive, the proactive ones will distinguish themselves by embracing strategic investments in penetration

The Smartest #Investment in #Cybersecurity? Penetration Testing

Cybersecurity breaches are no longer hypothetical, they are inevitable. While many organizations remain reactive, the proactive ones will distinguish themselves by embracing strategic investments in penetration
Logisek (@logisekict) 's Twitter Profile Photo

What You Really Get After Paying a #Ransomware Demand When a ransomware payment is made, something unexpected is often received in return, sometimes indirectly: a "report". A dark parody of a penetration test deliverable, one that wasn’t requested, wasn’t planned for, and

What You Really Get After Paying a #Ransomware Demand

When a ransomware payment is made, something unexpected is often received in return, sometimes indirectly: a "report". A dark parody of a penetration test deliverable, one that wasn’t requested, wasn’t planned for, and
Logisek (@logisekict) 's Twitter Profile Photo

Last-Minute #Security A recurring pattern has been observed across organizations of all sizes, particularly software houses, when requesting security assessments. The demand for Grey Box #Web #Application Penetration Testing and #Source #Code #Reviews often arrives not at the

Last-Minute #Security

A recurring pattern has been observed across organizations of all sizes, particularly software houses, when requesting security assessments. The demand for Grey Box #Web #Application Penetration Testing and #Source #Code #Reviews often arrives not at the
Logisek (@logisekict) 's Twitter Profile Photo

A #Kerberos Replay Attack Detected: What It Means and How It can Be Handled A Kerberos #replay #attack has been identified on a #domain #controller. This type of event is triggered when an identical authentication request is received more than once, a behavior typically

A #Kerberos Replay Attack Detected: What It Means and How It can Be Handled

A Kerberos #replay #attack has been identified on a #domain #controller. This type of event is triggered when an identical authentication request is received more than once, a behavior typically
Logisek (@logisekict) 's Twitter Profile Photo

When a Standard Domain User Becomes the Entry Point In a recent assumed breach engagement, a stark reminder was demonstrated, the underestimated risk posed by a simple employee domain account. Within just minutes of initial access, a standard domain user account was leveraged

When a Standard Domain User Becomes the Entry Point

In a recent assumed breach engagement, a stark reminder was demonstrated, the underestimated risk posed by a simple employee domain account.

Within just minutes of initial access, a standard domain user account was leveraged
Logisek (@logisekict) 's Twitter Profile Photo

#Active #Directory #Hardening Active Directory (AD) remains a prime target for threat actors due to its central role in identity and access management. To significantly reduce attack surfaces and limit lateral movement, a structured hardening initiative should be executed. ---

#Active #Directory #Hardening

Active Directory (AD) remains a prime target for threat actors due to its central role in identity and access management. To significantly reduce attack surfaces and limit lateral movement, a structured hardening initiative should be executed.

---
Logisek (@logisekict) 's Twitter Profile Photo

#Cloud #Infrastructures – #Threats & #Defenses in the Cloud Era For a detailed analysis in Greek, read our full article published in ITSecurityPro — link at the end of this post. The #Cloud #Dilemma The adoption of cloud infrastructures has transformed how businesses deploy,

#Cloud #Infrastructures – #Threats & #Defenses in the Cloud Era

For a detailed analysis in Greek, read our full article published in ITSecurityPro — link at the end of this post.

The #Cloud #Dilemma

The adoption of cloud infrastructures has transformed how businesses deploy,
Logisek (@logisekict) 's Twitter Profile Photo

#Outgoing Traffic: The Silent Enabler of #CyberThreats In many organizations, the focus of security engineering has traditionally been directed inward, firewalls block incoming threats, IDS alerts on anomalous payloads, and antivirus defends endpoints. However, outgoing traffic

#Outgoing Traffic: The Silent Enabler of #CyberThreats

In many organizations, the focus of security engineering has traditionally been directed inward, firewalls block incoming threats, IDS alerts on anomalous payloads, and antivirus defends endpoints. However, outgoing traffic
Logisek (@logisekict) 's Twitter Profile Photo

#Red #Teaming with #LOLBAS - Leveraging conhost.exe for Silent MSI Installation In red team operations, stealth and native tool abuse makes the difference. A particularly effective tactic could involve the abuse of Windows-native binaries, categorized under the LOLBAS (Living

#Red #Teaming with #LOLBAS - Leveraging conhost.exe for Silent MSI Installation

In red team operations, stealth and native tool abuse makes the difference. A particularly effective tactic could involve the abuse of Windows-native binaries, categorized under the LOLBAS (Living
Logisek (@logisekict) 's Twitter Profile Photo

How to #Prevent #Vulnerabilities Before They Show Up in a #Pentest It is often asked during pentest debriefs: "How could we have prevented these vulnerabilities before the test?" The reality is, by the time a vulnerability is discovered during a penetration test, it might

How to #Prevent #Vulnerabilities Before They Show Up in a #Pentest

It is often asked during pentest debriefs: "How could we have prevented these vulnerabilities before the test?"

The reality is, by the time a vulnerability is discovered during a penetration test, it might
Logisek (@logisekict) 's Twitter Profile Photo

#Penetration #Testing Confirmed Your Suspicions, But What Now? A penetration test has been conducted. The results are in. Dozens of #vulnerabilities, ranging from weak credentials to legacy system exposures, have been identified, sorted, and risk-rated. A clear, consolidated

#Penetration #Testing Confirmed Your Suspicions, But What Now?

A penetration test has been conducted. The results are in. Dozens of #vulnerabilities, ranging from weak credentials to legacy system exposures, have been identified, sorted, and risk-rated. A clear, consolidated
Logisek (@logisekict) 's Twitter Profile Photo

No #Data, No #Decision - Just Intuition? The Hidden Cost of Guesswork Decisions made without supporting data often rely on gut instinct. While intuition plays a role, the absence of empirical evidence introduces significant risks-risks that organizations cannot afford in today’s

No #Data, No #Decision - Just Intuition? The Hidden Cost of Guesswork

Decisions made without supporting data often rely on gut instinct. While intuition plays a role, the absence of empirical evidence introduces significant risks-risks that organizations cannot afford in today’s
Logisek (@logisekict) 's Twitter Profile Photo

#Penetration #Testing - A Fixed Price or a Fixed Illusion? A growing trend has been observed across the offensive security landscape: organizations are being offered penetration testing services with fixed pricing lists, bundled add-ons, and so-called "bonus" assessments. But

#Penetration #Testing - A Fixed Price or a Fixed Illusion?

A growing trend has been observed across the offensive security landscape: organizations are being offered penetration testing services with fixed pricing lists, bundled add-ons, and so-called "bonus" assessments.

But