This guide explains how to build a distributed command execution system using Celery and Redis to enhance bug bounty reconnaissance. It highlights the advantages of parallel processing, automation, and scalability for scanning large scopes efficiently. #Celery #Redis #BugBountyTools #DistributedCommandExecution
Tag: SIEM

This article explains how Kerberoasting is a covert attack technique exploiting Service Principal Names (SPNs) in Active Directory to recover service account passwords. It details methods of exploitation, detection, and mitigation strategies to defend against this threat. #Kerberoasting #ActiveDirectory #SPN #MITRE T1558.003

BERT is a newly emerged ransomware group active in Europe, Asia, and the US, targeting multiple sectors including healthcare and technology with Windows and Linux variants. Their tactics involve PowerShell loaders, privilege escalation, and fast multi-threaded encryption, including forced shutdowns of ESXi virtual machines to maximize damage. #BERT #WaterPombero #ESXi #PowerShell…

APT36 (Transparent Tribe) has launched a sophisticated cyber-espionage campaign targeting the Indian defense sector using Linux-focused malware delivered via phishing emails. The campaign employs a multi-stage attack involving a malicious .desktop file that downloads a decoy PowerPoint and executes an ELF binary payload to gain unauthorized access. #APT36 #BOSSLinux #TransparentTribe

Adaptive AI in SOC platforms offers dynamic, real-time threat analysis and triage, surpassing static pre-trained models that are limited to predefined use cases. This approach enhances threat detection, improves response times, and reduces workload for security teams. #Radiant #AdaptiveAI…

The article lists multiple cybersecurity job openings worldwide, detailing roles ranging from Application Security Engineer to Threat Intelligence Lead, each with specific responsibilities related to securing systems, managing risks, and conducting threat analysis. These positions emphasize expertise in areas such as CI/CD security, cloud environments, incident response, and compliance with security standards. #CI_CD #MITRE_ATTCK #Threat_Intelligence #Cloud_Security

The Secure Enterprise Browser Maturity Guide highlights the importance of addressing browser security, a critical yet overlooked layer in modern enterprise cybersecurity. It offers a practical framework for CISOs and security teams to enhance visibility, control, and integration of browser-layer security amidst growing threats like GenAI misuse and shadow SaaS.
#BrowserSecurity #GenAIrisks…

PhishHound is an open-source Python tool designed to help analysts quickly triage suspicious email headers, focusing on common authentication failure indicators. It enhances phishing detection by providing customizable rules, heuristic scoring, and clear risk assessments, aiding security teams in identifying malicious emails early. #PhishHound #EmailHeaderAnalysis

This article explores the importance of manual threat reconnaissance and proactive hunting strategies using Criminal IPβs Tag and Filter functions to identify malicious infrastructure. These real-world query examples help cybersecurity professionals detect C2 servers, exposed DevOps platforms, SSL VPNs, and compromised systems, improving early attack detection. #Mythic #C2servers #DevOps #SSLVPN #ThreatDetection

This article discusses how agentic AI SOC Analysts are transforming security operations by automating routine tasks, reducing false positives, and addressing the global shortage of skilled analysts. Implementing AI-driven solutions like Prophet Security can enhance efficiency, improve threat detection, and align security efforts with business outcomes. #AgenticAI #ProphetSecurity…

Elastic’s TRADE team analyzed OAuth phishing attacks targeting Microsoft Entra ID, inspired by Volexity’s findings on UTA0352 threat actor exploiting OAuth workflows to access Microsoft 365 resources. Their research includes hands-on emulation of attacks, revealing token abuse mechanics, device registration, and detection strategies to mitigate such identity-based threats. #UTA0352 #MicrosoftEntraID #ROADtools

This collection provides a comprehensive overview of the latest AI security research, threats, tools, and upcoming events. It emphasizes safeguarding agentic AI systems, addressing vulnerabilities, and ensuring compliance in AI deployments. #MAESTRO #MITRE D3FEND

The article lists various global cybersecurity job openings, detailing roles from Cyber Security Analyst to Senior Penetration Tester across multiple industries and countries. Each position emphasizes responsibilities such as incident response, threat intelligence, security architecture, vulnerability management, and compliance. #CyberSecurityJobs #IncidentResponse #ThreatIntelligence #VulnerabilityManagement

This article discusses how AI can address burnout and inefficiencies in Security Operations Centers (SOCs) by automating repetitive tasks and supporting analyst growth. It emphasizes the importance of smarter automation, real-time feedback, and leadership insights to build more sustainable and effective SOC teams. #SANS #AIforSOC…
![Cybersecurity News | Daily Recap [21 Jun 2025] Cybersecurity News | Daily Recap [21 Jun 2025]](https://www.hendryadrian.com/tweet/image/DailyRecap.png)
Cybersecurity incidents this week include Kairos ransomware stealing nearly 2 TB of data from Taos County and demanding ransom, while Aflac faces a breach linked to Scattered Spider attacks exposing sensitive information. Additionally, the Tonga Ministry of Health experiences a ransomware attack disrupting healthcare services, and North Korean Lazarus group conducts an $11 million crypto theft via social engineering. Experts highlight critical vulnerabilities in IBM QRadar SIEM and Versa Director SD-WAN, alongside innovative malware campaigns like PowerShell loaders and NodeInitRAT. Massive DDoS attacks, such as Cloudflareβs record-breaking 7.3 Tbps mitigation, demonstrate ongoing network threats. Hashtags: #KairosRansomware #ScatteredSpider #LazarusGroup #NodeInitRAT #CloudflareDDoS