Happy Monday! For those following cybersecurity news, this past week has been a doozy! While I hope this newsletter helps you stay up to date I am really focused on the insights we can obtain from all that’s going on. If you get value and you’d like to reciprocate, the best way to do that is by sharing my newsletter subscribe link on social media. Truly appreciate you! Have an amazing week. 🙏 🩺Threat PulseVSCode extensions found downloading early-stage ransomware
If you have people using VSCode in your organization, you’ve got to have a process for handling extensions. Don’t assume that because you have people using VSCode that they are able to identify malicious extensions or that they only install them from trusted sources. Inspect what you expect on this one. Steam pulls game demo infecting Windows with info-stealing malware
This one obviously applies to home users, but I wanted to include this for any of you that are in IT at universities. Especially those who have Esports teams, which is becoming more popular. Rule #1, DO NOT put those gaming machines on the production network. You should isolate them completely. Yes, you can still install AV/EDR on them and maybe even enroll them into Intune. But these machines are inherently risky. So much so that you don’t want them anywhere near your production environment. Veeam RCE bug lets domain users hack backup servers, patch now
Veeam, fortunately or unfortunately, is the target for much security research. A testament to how popular and successful they have become. Naturally that puts a target on their back. I don’t know the exact percentage, but in a large majority of clients environments I have pentested in the last 4 years, most of them have been using Veeam. Here’s my advice on this: Make sure you have a process for quickly patching your veeam (or whatever solution) backup infrastructure. The quicker the better, obviously depending on the severity and exploitable nature of the issue. While were talking about backups you might as well:
GitHub Action supply chain attack exposed secrets in 218 repos
GitHub is still kind of a wild west. But there’s tools to help manage and mitigate risk that GitHub repositories present for organization. If you have anyone in your organization using GitHub it’s a good idea to:
Phony CAPTCHA checks trick targets to download malware
There are very few examples that are better than this one for why you should really consider implementing Application Control. Either using AppLocker, App Control for Business (previously WDAC), or a 3rd party product. Another tip is to change the default file associations for the various scripting languages (.bat, .vbs, .ps1, .cmd, etc.) so when you double click them they open in notepad. Here’s how:
Infostealers fueled cyberattacks and snagged 2.1B credentials last year
Infostealers are the gift that, unfortunately, keeps on giving. There’s no silver bullets for defending organizations from the downstream impact that’s possible as a result of infostealers. To me, it’s the “basics” or the “foundational” things that help the most.
🔐Securing the Stack3 Scheduled Task Security Best Practices
😆Memes & MayhemI posted this on X over the weekend. Hits home for some I’m sure 😅😂 If you’re not following me there, drop me a follow so you don’t miss out on regular memes and some cybersecurity insights once in a while. One last one. I venture to guess some of us feel like this on certain Mondays. If that’s you today, hang in there. 🙏 👨💻Behind the ConsoleI was able to participate in something really cool that NinjaOne put together. They are going to be releasing something called IT Quest on April 1st. Here’s a sneak peak into what that is featuring me and some other super cool IT/content creator folks! Definitely more to come on this. 🧙♂️⚔🛡
That’s all for now. Hope you have a super awesome week! All the best "Spirit of a hacker heart of a defender" |
Pentester/recovering sysadmin Self-proclaimed Ethical Threat Active Directory Security Connoisseur Offensive stuff — securit360.com Host Cyber Threat POV — offsec.blog SWAG — swag.ethicalthreat.com 📩 By subscribing, you’ll get exclusive access to industry insights, actionable tips for securing your environments, behind-the-scenes content from my pentests, and updates from someone who keeps a pulse on the ever-changing cyber threat landscape.
Hey there! Hope you had a great weekend. Let's get into it! 🩺Threat Pulse China’s Tacit Admission of Volt Typhoon Attacks At a December 2024 Geneva summit, China’s Ministry of Foreign Affairs cyber official Wang Lei made ambiguous remarks that U.S. delegates interpreted as a confession of Beijing’s role in the Volt Typhoon campaign—cyber intrusions on U.S. infrastructure tied to Washington’s support for Taiwan. Key Takeaways: The U.S. delegation saw Wang Lei’s comments as a warning: China is...
Hey there! Hoping you had an awesome weekend! It's cold and rainy here in NY and I am literally so over it. Hah. I hope you enjoy this weeks newsletter. Please hit reply and leave me some feedback or roast me. Would love to tune this and make it incredibly useful and valuable to you. I will consider ALL ideas. 🩺Threat Pulse GitHub expands security tools after 39 million secrets leaked in 2024 GitHub detected over 39 million leaked secrets, such as API keys and credentials, in repositories...
What's up everyone! Happy Monday. It's another great week over here because yes, I am again on another internal pentest engagement. This time the clients in the financial services industry. The last few before that have been law firms. Lot of exciting stuff in the works for me personally and with SecurIT360, so stay tuned. Have an awesome week! I appreciate you being a part of this newsletter community. 🙏 🩺Threat Pulse Microsoft’s killing script used to avoid Microsoft Account in Windows 11...