FashionProof
@fashionproof.bsky.social
π€ 235
π₯ 456
π 930
infosec - no one of consequence
https://medium.com/@markmotig
reposted by
FashionProof
Joe Slowik
about 12 hours ago
Sigh
0
10
2
Favorite N.N.T. paragraphs today. "These people are professionally employed in the business of questioning what we take for granted" "Yet the believe blindly in the stock market" Makes me wonder when the next Black Swan stock market event will occur (soon?). I do not trust the stock market.
about 12 hours ago
0
0
0
reposted by
FashionProof
Joe Slowik
about 14 hours ago
1
11
3
reposted by
FashionProof
InfoSecSherpa
2 days ago
I paid attention to the
#InfoSec
and
#DataPrivacy
news from over the weekend so you didn't have to! Read "What'd I Miss? InfoSec Weekend News Roundup for December 5 - 7, 2025"
sherpaintelligence.substack.com/p/whatd-i-mi...
loading . . .
What'd I Miss? InfoSec Weekend News Roundup for December 5 - 7, 2025
I paid attention to the Information Security and Data Privacy news from over the weekend so you wouldn't have to! Curated by Sherpa Intelligence: Your Guide Up a Mountain of Information!
https://sherpaintelligence.substack.com/p/whatd-i-miss-infosec-weekend-news-33d
0
5
3
Anyone know how good AI does unwinding packers?
add a skeleton here at some point
1 day ago
0
0
0
reposted by
FashionProof
BleepingComputer
1 day ago
Several ransomware groups have been spotted using a packer-as-a-service (PaaS) platform named Shanya to assist in EDR (endpoint detection and response) killing operations.
loading . . .
Ransomware gangs turn to Shanya EXE packer to hide EDR killers
Several ransomware groups have been spotted using a packer-as-a-service (PaaS) platform named Shanya to assist in EDR (endpoint detection and response) killing operations.
https://www.bleepingcomputer.com/news/security/ransomware-gangs-turn-to-shanya-exe-packer-to-hide-edr-killers/
0
5
4
reposted by
FashionProof
Twonks
2 days ago
π¨ββοΈ
1
354
55
reposted by
FashionProof
purr.in.ink
3 days ago
Even self-care can turn into another stressful job. This is just a little reminder to take the pressure off when you can. Itβs okay to just be sometimes. πΎ
14
977
350
reposted by
FashionProof
Phillip Wylie
4 days ago
From Chokeslams To Pwnage: Phillip Wylie Shares His Journey From Pro Wrestling To Offensive Security β SecurityTrails
loading . . .
From Chokeslams To Pwnage: Phillip Wylie Shares His Journey From Pro Wrestling To Offensive Security - SecurityTrails - Phillip Wylie
Phillip Wylie's Journey From Pro Wrestling To Offensive Security
https://thehackermaker.com/from-chokeslams-to-pwnage-phillip-wylie-shares-his-journey-from-pro-wrestling-to-offensive-security-securitytrails/
0
3
1
reposted by
FashionProof
Chris Hanretty
4 days ago
From the same paper: people using a *search engine* demonstrated "approximately 34-48% lower total connectivity across the brain". Brain connectivity is a good measure of... brain connectivity.
add a skeleton here at some point
5
102
17
If you are in cybersecurity, I recommend checking out
@ransomware.live
daily... There is so much work to do. Hell, maybe apply to these companies after they get hit. I will bet the security budget increases..
#cybersecurity
add a skeleton here at some point
5 days ago
0
0
0
Favorite N.N.T. Paragraph today. "our ingrained desire to simplify"
5 days ago
0
0
0
reposted by
FashionProof
Randall Munroe
5 days ago
Website Task Flowchart
xkcd.com/3175/
61
4452
934
reposted by
FashionProof
Tanya Janca | SheHacksPurple
5 days ago
Hey folks, I don't have a sponsor yet for my December SheHacksPurple nerd-a-licious newsletter of 10,435 subscribers. If you want to reach a large audience of
#appsec
and security conscious devs, give me a holler.
0
2
2
reposted by
FashionProof
GreyNoise
5 days ago
Palo + SonicWall campaign uncovered. We dug into a spike of GlobalProtect login attempts earlier this week and found something unexpected. Full analysis:
www.greynoise.io/blog/hidden-...
#Palo
#SonicWall
#Cybersecurity
loading . . .
https://www.greynoise.io/blog/hidden-pattern-credential-based-attacks-palo-alto-sonicwall
0
3
2
reposted by
FashionProof
Taggart
6 days ago
The first PoCs for these vulns are now always fake. Watch
https://react2shell.com
for disclosure from the discoverers.
1
4
1
reposted by
FashionProof
Cynthia Brumfield
6 days ago
Reaction to this story over at
infosec.exchange
add a skeleton here at some point
0
9
5
reposted by
FashionProof
Barry Dorrans
7 days ago
Farewell to try .NET a way to run code right in docs that allowed me to introduce a new set of developers and PMs to various security challenges and problems over 10 years. It evolved from running lots of containers in weird isolation setups, all the way through to WASM.
loading . . .
GitHub - dotnet/try: Try .NET provides developers and content authors with tools to create interactive experiences.
Try .NET provides developers and content authors with tools to create interactive experiences. - dotnet/try
https://github.com/dotnet/try
2
22
6
I saw this on reddit the other day and shared it with some friends. I absolutely love the limitlessness of dreaming. It is my favorite part.
7 days ago
0
0
0
reposted by
FashionProof
threddy
8 days ago
black friday cyber monday giving tuesday broke on wednesday
3
15
1
reposted by
FashionProof
InfoSec
8 days ago
How to build forward-thinking cybersecurity teams for tomorrow
loading . . .
How to build forward-thinking cybersecurity teams for tomorrow | Microsoft Security Blog
To secure the future, we must future-proof our cybersecurity talent and develop teams that are agile, innovative, and perpetually learning.
https://www.microsoft.com/en-us/security/blog/2025/12/02/how-to-build-forward-thinking-cybersecurity-teams-for-tomorrow/
0
2
1
Favorite N.N.T. today: I just love the sentance "generator" of reality.
8 days ago
0
0
0
Pen test tip: Look for accounts, computer names, etc from other pen test companies acronyms/names. Sometimes people or scripts fail to clean up.
#cybersecurity
8 days ago
0
0
0
Favorite N.N.T. paragraphs today I feel "the incompleteness of information" in my bones when trying to root out security issues.
#cybersecurity
9 days ago
0
1
1
reposted by
FashionProof
Phillip Wylie
10 days ago
STΓK: Hacking, Content Creation, and Good Vibes
loading . . .
STΓK: Hacking, Content Creation, and Good Vibes - Phillip Wylie
Summary In this episode of the Phillip Wylie Show, StΓΆk shares his journey from a technical background in infrastructure to becoming a successful bug bounty hunter and content creator. He emphasizes the importance of communication skills in the cybersecurity field, offers tips for aspiring content creators, and discusses the significance of building a personal brand.β¦
https://thehackermaker.com/stok-hacking-content-creation-and-good-vibes/
0
3
1
I wonder how many companies outbound ip's are affected. I am clean. The rest of you are suspect :)
www.bleepingcomputer.com/news/securit...
loading . . .
GreyNoise launches free scanner to check if you're part of a botnet
GreyNoise Labs has launched a free tool called GreyNoise IP Check that lets users check if their IP address has been observed in malicious scanning operations, like botnet and residential proxyΒ networ...
https://www.bleepingcomputer.com/news/security/greynoise-launches-free-scanner-to-check-if-youre-part-of-a-botnet/
10 days ago
0
0
0
Favorite N.N.T. paragraph today. Unrelated, I will be checking limits of in memory recusive compiling tomorrow. I wonder if it will be some specific number or just crash when it runs out of memory. Or maybe something interesting will happen like zip recursion.
#testthelimits
10 days ago
1
0
0
reposted by
FashionProof
0xdf
11 days ago
Era from HackTheBox has multiple IDOR vulnerabilities followed by a PHP injection invoking the PHP SSH module to run commands on the host. Then there's a signed Linux binary to negotiate for root.
loading . . .
HTB: Era
Era starts with a custom file upload website full of insecure direct object reference vulnerabilities. Iβll create an account and abuse one IDOR to download a site backup from the admin account. Then Iβll abuse an IDOR like vulnerability to get admin access to the site. The admin panel has a PHP vulnerability where I can get it to use the SSH module to login to the host and run commands, providing a reverse shell. From there, Iβll create my own signed binary to replace one that I can run with sudo to get root.
https://0xdf.gitlab.io/2025/11/29/htb-era.html
0
5
1
reposted by
FashionProof
πΈPaulπΉ
14 days ago
Black Friday Sales but for groceries, rent, electricity bills, and healthcare.
1
8
3
reposted by
FashionProof
_RastaMouse
12 days ago
This iteration leverages the power of
@raphaelmudge.bsky.social
's Crystal Palace ecosystem to build custom evasion tradecraft, and apply it to Beacon, BOFs and post-ex DLLs.
add a skeleton here at some point
0
8
3
reposted by
FashionProof
Jeffrey Vagle
13 days ago
Surely the ice beneath our feet is thick enough to support our weight, right?
add a skeleton here at some point
0
10
3
It would not be Thanksgiving without this N.N.T. quote. Do not think like a turkey.
13 days ago
0
3
0
reposted by
FashionProof
InfoSec
14 days ago
How Malware Authors Are Incorporating LLMs to Evade Detection
loading . . .
How Malware Authors Are Incorporating LLMs to Evade Detection
Cyberattackers are integrating large language models (LLMs) into the malware, running prompts at runtime to evade detection and augment their code on demand.
https://www.darkreading.com/threat-intelligence/malware-authors-incorporate-llms-evade-detection
0
2
1
reposted by
FashionProof
InfoSec
14 days ago
Teaching Claude to Cheat Reward Hacking Coding Tasks Makes Them Behave Maliciously in Other Tasks
loading . . .
Teaching Claude to Cheat Reward Hacking Coding Tasks Makes Them Behave Maliciously in Other Tasks
https://cybersecuritynews.com/teaching-claude-to-cheat/
0
3
1
reposted by
FashionProof
El Jefe De Security
14 days ago
Microsoft announced to all its FTEs this same lie that they should buy a different router than tp-link. When I asked them what they recommended instead? They said Asus. For the record: Asus routers have had more reported vulns than tplink in the last decade. Put that in you pipe and smoke it.
add a skeleton here at some point
3
11
6
Favorite N.N.T. paragraph today. There are a few people in Cyber I wish could be funded with FU money and let them research whatever they wanted to make the world better.
#cybersecurity
14 days ago
0
1
0
reposted by
FashionProof
Kevin Beaumont
15 days ago
Nvidia unveiled their new logo today.
3
95
14
Favorite N.N.T. paragraph today.
15 days ago
0
1
1
reposted by
FashionProof
Twonks
11 months ago
If you fancy supporting Twonks I am now on Patreon. Link in bio π
2
69
10
reposted by
FashionProof
Twonks
9 months ago
β°
4
367
31
reposted by
FashionProof
Twonks
4 months ago
π’
5
452
69
reposted by
FashionProof
Twonks
4 months ago
Wet floor
3
393
41
reposted by
FashionProof
Twonks
3 months ago
Gotta get them steps up
5
478
64
reposted by
FashionProof
Twonks
about 2 months ago
Vegan menu
1
342
48
reposted by
FashionProof
Twonks
about 1 month ago
π§
0
371
74
reposted by
FashionProof
Twonks
21 days ago
Home delivery
3
321
54
reposted by
FashionProof
Ransomware.live
19 days ago
According to Ransomware.live, clop ransomware group has added
TULANE.EDU
(πΊπΈ) to its victims.
0
0
1
reposted by
FashionProof
Ransomware.live
19 days ago
According to Ransomware.live, clop ransomware group has added
CANON.COM
(π―π΅) to its victims.
0
0
1
reposted by
FashionProof
Ransomware.live
19 days ago
According to Ransomware.live, clop ransomware group has added
MICHELIN.COM
(π«π·) to its victims.
0
0
1
reposted by
FashionProof
Ransomware.live
19 days ago
According to Ransomware.live, clop ransomware group has added
MACYS.COM
(πΊπΈ) to its victims.
0
0
1
Load more
feeds!
log in