Happy Monday! For those following cybersecurity news, this past week has been a doozy! While I hope this newsletter helps you stay up to date I am really focused on the insights we can obtain from all that’s going on. If you get value and you’d like to reciprocate, the best way to do that is by sharing my newsletter subscribe link on social media. Truly appreciate you! Have an amazing week. 🙏 🩺Threat PulseVSCode extensions found downloading early-stage ransomware
If you have people using VSCode in your organization, you’ve got to have a process for handling extensions. Don’t assume that because you have people using VSCode that they are able to identify malicious extensions or that they only install them from trusted sources. Inspect what you expect on this one. Steam pulls game demo infecting Windows with info-stealing malware
This one obviously applies to home users, but I wanted to include this for any of you that are in IT at universities. Especially those who have Esports teams, which is becoming more popular. Rule #1, DO NOT put those gaming machines on the production network. You should isolate them completely. Yes, you can still install AV/EDR on them and maybe even enroll them into Intune. But these machines are inherently risky. So much so that you don’t want them anywhere near your production environment. Veeam RCE bug lets domain users hack backup servers, patch now
Veeam, fortunately or unfortunately, is the target for much security research. A testament to how popular and successful they have become. Naturally that puts a target on their back. I don’t know the exact percentage, but in a large majority of clients environments I have pentested in the last 4 years, most of them have been using Veeam. Here’s my advice on this: Make sure you have a process for quickly patching your veeam (or whatever solution) backup infrastructure. The quicker the better, obviously depending on the severity and exploitable nature of the issue. While were talking about backups you might as well:
GitHub Action supply chain attack exposed secrets in 218 repos
GitHub is still kind of a wild west. But there’s tools to help manage and mitigate risk that GitHub repositories present for organization. If you have anyone in your organization using GitHub it’s a good idea to:
Phony CAPTCHA checks trick targets to download malware
There are very few examples that are better than this one for why you should really consider implementing Application Control. Either using AppLocker, App Control for Business (previously WDAC), or a 3rd party product. Another tip is to change the default file associations for the various scripting languages (.bat, .vbs, .ps1, .cmd, etc.) so when you double click them they open in notepad. Here’s how:
Infostealers fueled cyberattacks and snagged 2.1B credentials last year
Infostealers are the gift that, unfortunately, keeps on giving. There’s no silver bullets for defending organizations from the downstream impact that’s possible as a result of infostealers. To me, it’s the “basics” or the “foundational” things that help the most.
🔐Securing the Stack3 Scheduled Task Security Best Practices
😆Memes & MayhemI posted this on X over the weekend. Hits home for some I’m sure 😅😂 If you’re not following me there, drop me a follow so you don’t miss out on regular memes and some cybersecurity insights once in a while. One last one. I venture to guess some of us feel like this on certain Mondays. If that’s you today, hang in there. 🙏 👨💻Behind the ConsoleI was able to participate in something really cool that NinjaOne put together. They are going to be releasing something called IT Quest on April 1st. Here’s a sneak peak into what that is featuring me and some other super cool IT/content creator folks! Definitely more to come on this. 🧙♂️⚔🛡
That’s all for now. Hope you have a super awesome week! All the best "Spirit of a hacker heart of a defender" |
Pentester/recovering sysadmin Self-proclaimed Ethical Threat Active Directory Security Connoisseur Offensive stuff — securit360.com Host Cyber Threat POV — offsec.blog SWAG — swag.ethicalthreat.com
What's up everyone! Happy Monday. It's another great week over here because yes, I am again on another internal pentest engagement. This time the clients in the financial services industry. The last few before that have been law firms. Lot of exciting stuff in the works for me personally and with SecurIT360, so stay tuned. Have an awesome week! I appreciate you being a part of this newsletter community. 🙏 🩺Threat Pulse Microsoft’s killing script used to avoid Microsoft Account in Windows 11...
It's been an incredibly busy few weeks over here, I haven't had much time to get outside and touch some grass. But the weather is getting warming and I am so ready for it! I hope you enjoy this weeks email! I would love if you would reply and tell me which parts you liked or didn't care for. It won't hurt my feelings, I promise! 🩺Threat Pulse Malicious Adobe, DocuSign OAuth apps target Microsoft 365 accounts Cybercriminals are deploying fake Microsoft OAuth applications disguised as Adobe and...
Hey happy Monday! I hope you had super great weekend. I put time and attention into trying to deliver a valuable newsletter. A newsletter that I myself would look forward to reading. I hope I am able to deliver on that for you. If you do get value, please hit reply and let me know which section you like the most! Thanks so much 🙏 Have an awesome week! 🩺Threat Pulse Ransomware gang encrypted network from a webcam to bypass EDR What you should take away from this article: EDR alone is no longer...