Blue Team Alerts


Kanal geosi va tili: Hindiston, Inglizcha


Bringing the latest Blue Team news and information fresh to your Telegram inbox! 🔮
Red Teamer? Checkout @redteamalerts

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
Hindiston, Inglizcha
Statistika
Postlar filtri






What do you use for threat intel social media monitoring?
I found this thread from 6 years ago, talking about how TweetDeck was superb for monitoring cybernews (back when it was free, better days) and how to set it up. Now, TweetDeck is paid for - and even if we did pay for it, many people have left for Bluesky, Mastodon and Threads.The problem is finding a panel that can capture all of these sources. Mastodon isn't hard for porting through Twitter (sorry, X), as you get some websites, e.g. x.good.news, that bridge over tweets from over there to Mastodon. That would save paying for a Twitter API key. Even without that, three other websites as social media sources isn't particularly bad.My question is, what do you & your teams use for social media threat intelligence right now? Do you now pay to carry on using TweetDeck, or are there other solutions being used?

Discuss on Reddit: https://ift.tt/vtIYgq0
@blueteamalerts


Internet Crime Complaint Center (IC3) | Beijing Leveraging Freelance Hackers and Information Security Companies to Compromise Computer Networks Worldwide
https://ift.tt/j0hNxov

Discuss on Reddit: https://ift.tt/cgQnqhB
@blueteamalerts




AI Agents in Security Operations
Hey channelSo, I've been doing alot of research and brainstorming Also attended countless webinars on AI and how it affects Cybersecurity So here's my current question, what areas do you think AI agents would optimize the SOC of any organisation?I'm open to ideas...

Discuss on Reddit: https://ift.tt/I7Oel9H
@blueteamalerts


Compromising Threat Actor Communications
I recently "compromised" a threat actors Telegram based C2 channel that was used for exfiltration of stolen data from the Nova infostealer. The threat actor stupidly tested their infostealing malware on their OWN production "hacking" box. From this, I was able to gather 100+ screenshots & keylogs from the threat actors desktop - which exposed the campaigns he was performing, additional infrastructure he owned & lots of his plaintext credentials!Writeup of the compromise of communications & analysis of threat actor campaigns: https://polygonben.github.io/malware%20analysis/Compromising-Threat-Actor-Communications/Malware analysis of the Nova sample associated with this threat actor:https://polygonben.github.io/malware%20analysis/Nova-Analysis/

Discuss on Reddit: https://ift.tt/LipBHIk
@blueteamalerts




Unveiling EncryptHub: Analysis of a multi-stage malware campaign - "our investigation uncover[s] previously unseen aspects of their infrastructure, tooling, and behavioral patterns."
https://ift.tt/tP0RqBU

Discuss on Reddit: https://ift.tt/SlQuOvr
@blueteamalerts


Elearnsecurity (eCIR exam) plz give me advice guys
HI guys, i do lot of labs in cyberdefenders. these are wireshark, splunk, elk labs. and i got BTL1 certificate 7-8 month ago, i want to know that am i ready for eCIR exam or not.
but i have one problem : i dont know how can i start the IR in exam, because there is not any questions.
CAN you you give me general advice about eCIR exam?

Discuss on Reddit: https://ift.tt/f3cYhPG
@blueteamalerts




CVE-2025-27607: Python JSON Logger is a JSON Formatter for Python Logging. Between 30 December 2024 and 4 March 2025 Python JSON Logger was vulnerable to RCE through a missing dependency
https://ift.tt/67UKklc

Discuss on Reddit: https://ift.tt/uxkWUhG
@blueteamalerts


Update: Stopping Cybercriminals from Abusing Cobalt Strike | Cobalt Strike - "Over the past two years, the number of unauthorized copies of Cobalt Strike observed in the wild has decreased by 80%" - including domain seizures as a tool
https://ift.tt/cLpN5WE

Discuss on Reddit: https://ift.tt/vVWOj2w
@blueteamalerts















20 ta oxirgi post ko‘rsatilgan.