What's up everyone! Happy Monday. It's another great week over here because yes, I am again on another internal pentest engagement. This time the clients in the financial services industry. The last few before that have been law firms. Lot of exciting stuff in the works for me personally and with SecurIT360, so stay tuned. Have an awesome week! I appreciate you being a part of this newsletter community. 🙏 🩺Threat PulseMicrosoft’s killing script used to avoid Microsoft Account in Windows 11Microsoft has removed the ‘BypassNRO.cmd’ script from Windows 11 preview builds, which allowed users to bypass the requirement to use a Microsoft Account when installing the operating system. Microsoft clearly wants to fight us for our data. They are removing a script (but not an entire feature just yet) that allows you to create a local non-Microsoft account when setting up a fresh windows 11 machine. If you find yourself in this position, here’s what you need to do for now:
The 4 WordPress flaws hackers targeted the most in Q1 2025A new report sheds light on the most targeted WordPress plugin vulnerabilities hackers used in the first quarter of 2025 to compromise sites. This report was created by a company that sells a Wordpress Security product. But that’s not why I wanted to call this out. It’s super common to see Wordpress vulnerabilities on external pentests. Here’s my advice for mitigating these risks:
FBI warnings are true—fake file converters do push malwareThe FBI is warning that fake online document converters are being used to steal peoples’ information and, in worst-case scenarios, to deploy ransomware on victims’ devices. These sites are like festering pimples. They normally don’t even work that great anyways let alone the possibility of them having malware injected into them. You’re better off using ChatGPT or similar if you’re not concerned about the data in the documents you’re trying co convert. If you are, there’s a number of open source tools you can use that would allow you to run them locally. You can always inspect the code yourself to check for sketchy stuff. Of course, users who don’t know any better are the biggest concern here. So education us important but also, technical controls like blocking these sites via content filtering would be a great next step. Critical flaw in Next.js lets hackers bypass authorizationA critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass authorization checks. I wanted to point this one out not because it’s another vulnerability but because it indicates a larger trend I see happening. That trend is, rapidly prototyped applications that are rushed to production littered with vulnerabilities and poor coding practices. I tested this for myself. I developed an automated google dorking application using cursor. I wrote it using node and next.js as frameworks. In developing some of the code, cursor literally dropped a command execution vulnerability right before my eyes. It didn’t even say anything about it. It didn’t warn me, nothing. Had I not been watching or reviewing the code it recommended I would have missed it. That’s exactly the type of issues we’re going to have to combat in this new age if “vibe coding.” 🫣 🔐Securing the StackHow to Analyze Threat Reports for Defenders🎥 Click here for the video version
😆Memes & MayhemSo image generation with ChatGPT 4o was just released and people are going wild over it. I thought I’d use my time procrastinating to create memes. 😂 Here’s what I came up with so far. Any of these relatable? 👨💻Behind the ConsoleAre you getting value from this newsletter? What can I do better? Feel to reply and let me know! Your feedback is imperative to me.
🔔P.s ➡ If you are not already, make sure to subscribe to my YouTube channel. I’m going to be posting longer form videos there starting with the analyzing threat reports video that I posted today! All the best "Spirit of a hacker heart of a defender" |
Pentester/recovering sysadmin Self-proclaimed Ethical Threat Active Directory Security Connoisseur Offensive stuff — securit360.com Host Cyber Threat POV — offsec.blog SWAG — swag.ethicalthreat.com
Happy Monday! For those following cybersecurity news, this past week has been a doozy! While I hope this newsletter helps you stay up to date I am really focused on the insights we can obtain from all that’s going on. If you get value and you’d like to reciprocate, the best way to do that is by sharing my newsletter subscribe link on social media. Truly appreciate you! Have an amazing week. 🙏 🩺Threat Pulse VSCode extensions found downloading early-stage ransomware Two malicious Visual Studio...
It's been an incredibly busy few weeks over here, I haven't had much time to get outside and touch some grass. But the weather is getting warming and I am so ready for it! I hope you enjoy this weeks email! I would love if you would reply and tell me which parts you liked or didn't care for. It won't hurt my feelings, I promise! 🩺Threat Pulse Malicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts Cybercriminals are deploying fake Microsoft OAuth applications disguised as Adobe and...
Hey happy Monday! I hope you had super great weekend. I put time and attention into trying to deliver a valuable newsletter. A newsletter that I myself would look forward to reading. I hope I am able to deliver on that for you. If you do get value, please hit reply and let me know which section you like the most! Thanks so much 🙏 Have an awesome week! 🩺Threat Pulse Ransomware gang encrypted network from a webcam to bypass EDR What you should take away from this article: EDR alone is no longer...