What's up everyone! Happy Monday. It's another great week over here because yes, I am again on another internal pentest engagement. This time the clients in the financial services industry. The last few before that have been law firms. Lot of exciting stuff in the works for me personally and with SecurIT360, so stay tuned. Have an awesome week! I appreciate you being a part of this newsletter community. 🙏 🩺Threat PulseMicrosoft’s killing script used to avoid Microsoft Account in Windows 11Microsoft has removed the ‘BypassNRO.cmd’ script from Windows 11 preview builds, which allowed users to bypass the requirement to use a Microsoft Account when installing the operating system. Microsoft clearly wants to fight us for our data. They are removing a script (but not an entire feature just yet) that allows you to create a local non-Microsoft account when setting up a fresh windows 11 machine. If you find yourself in this position, here’s what you need to do for now:
The 4 WordPress flaws hackers targeted the most in Q1 2025A new report sheds light on the most targeted WordPress plugin vulnerabilities hackers used in the first quarter of 2025 to compromise sites. This report was created by a company that sells a Wordpress Security product. But that’s not why I wanted to call this out. It’s super common to see Wordpress vulnerabilities on external pentests. Here’s my advice for mitigating these risks:
FBI warnings are true—fake file converters do push malwareThe FBI is warning that fake online document converters are being used to steal peoples’ information and, in worst-case scenarios, to deploy ransomware on victims’ devices. These sites are like festering pimples. They normally don’t even work that great anyways let alone the possibility of them having malware injected into them. You’re better off using ChatGPT or similar if you’re not concerned about the data in the documents you’re trying co convert. If you are, there’s a number of open source tools you can use that would allow you to run them locally. You can always inspect the code yourself to check for sketchy stuff. Of course, users who don’t know any better are the biggest concern here. So education us important but also, technical controls like blocking these sites via content filtering would be a great next step. Critical flaw in Next.js lets hackers bypass authorizationA critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass authorization checks. I wanted to point this one out not because it’s another vulnerability but because it indicates a larger trend I see happening. That trend is, rapidly prototyped applications that are rushed to production littered with vulnerabilities and poor coding practices. I tested this for myself. I developed an automated google dorking application using cursor. I wrote it using node and next.js as frameworks. In developing some of the code, cursor literally dropped a command execution vulnerability right before my eyes. It didn’t even say anything about it. It didn’t warn me, nothing. Had I not been watching or reviewing the code it recommended I would have missed it. That’s exactly the type of issues we’re going to have to combat in this new age if “vibe coding.” 🫣 🔐Securing the StackHow to Analyze Threat Reports for Defenders🎥 Click here for the video version
😆Memes & MayhemSo image generation with ChatGPT 4o was just released and people are going wild over it. I thought I’d use my time procrastinating to create memes. 😂 Here’s what I came up with so far. Any of these relatable? 👨💻Behind the ConsoleAre you getting value from this newsletter? What can I do better? Feel to reply and let me know! Your feedback is imperative to me.
🔔P.s ➡ If you are not already, make sure to subscribe to my YouTube channel. I’m going to be posting longer form videos there starting with the analyzing threat reports video that I posted today! All the best "Spirit of a hacker heart of a defender" |
Pentester/recovering sysadmin Self-proclaimed Ethical Threat Active Directory Security Connoisseur Offensive stuff — securit360.com Host Cyber Threat POV — offsec.blog SWAG — swag.ethicalthreat.com 📩 By subscribing, you’ll get exclusive access to industry insights, actionable tips for securing your environments, behind-the-scenes content from my pentests, and updates from someone who keeps a pulse on the ever-changing cyber threat landscape.
Admin due diligence crushes clickgrab tricks. Ethical Threat Insight: How to Spot and Stop Clickgrab Attacks Clickgrab isn’t just about tricking users, it’s about tricking you, the admin. The ClickGrab technique is super tricky because of the fake-CAPTCHA pages. The technique is centered around hijacking your clipboard with malicious PowerShell commands and then tricking you into pasting the malicious commands into the run dialog. But there is hope! PasteEater is a super cool utility that...
More isn’t better. Better is better. Quantity fades. Quality lasts. Ethical Threat Insights: Deception, the best ROI in Security There is a misconception that more security alerts == safer environment. The reality is that’s not true. Better alerts == more actionable evidence means you’re responding to what matters most, not when your server goes haywire because of a benign scheduled task. Deception is the best ROI in security because: It’s inexpensive (especially compared to “traditional”...
Attackers love certificates. They open doors most people forget to lock. Ethical Threat Insight: Certificate Abuse Attacks Think certificates only protect websites? Inside your network, they’re like digital ID cards for users, computers, web servers, and even domain controllers. But here’s the problem… A weak or misconfigured certificate can let attackers: Impersonate administrators Escalate privileges Persist quietly Simple tip: Start by auditing your AD Certificate Services (ADCS) using...