Sign in to view Teoderick’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Germany
Sign in to view Teoderick’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
3K followers
500+ connections
Sign in to view Teoderick’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Teoderick
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Teoderick
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Teoderick’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Activity
3K followers
-
Teoderick C. shared thisDon’t let a "trusted" format fool you. Threat actors are becoming increasingly creative in how they bypass traditional security layers. A prime example is the BlankGrabber malware. In this campaign, adversaries use a batch script stager that mimics a Base64-encoded certificate. In reality, this "certificate" is a malicious loader designed to: ✅ Evade Detection: It identifies and bypasses sandbox and virtualization platforms. ✅ Deliver the Payload: It successfully deploys the final BlankGrabber Stealer. The Splunk Threat Research Team (STRT) has performed analysis into this threat. We’ve deconstructed these loaders and the payload to map out the relevant MITRE ATT&CK® tactics and techniques, helping us develop detections and comprehensive detection coverage for this threats. 🙂 🔍 Read the full technical analysis here: https://lnkd.in/dkU5zDgS #CyberSecurity #ThreatIntelligence #Splunk #MalwareAnalysis #MITREAttack #InfoSec #reverseengineering #int3 #detectionengineering #incidentresponse
-
Teoderick C. shared this#Splunk Threat Research Team (STRT) looking more into XML-based attacks lately, and we often think of malware arriving via .exe or .zip files, but the "MMC/MSC XML Runner Loader" technique reminds us that attackers are constantly evolving. What makes this one particularly sneaky? It exploits the current AI hype. 🤖 The malicious .msc file often masquerades as a helpful "AI Prompt Guide" or technical configuration tool. To the average user, it looks like a harmless PDF, but underneath, it’s a malicious loader designed to execute code while staying under the radar of traditional defenses. In this latest blog from the STRT, we provide an analysis of this loader and more importantly, actionable detection strategies. Continuous learning is the best defense. 🙂 Full article: https://lnkd.in/dnY5SR-J #BlueTeam #CyberSecurityTips #Splunk #TechCommunity #ThreatDetection #MalwareAnalysis #int3 #ReverseEngineering #DetectionEngineering #IncidentResponse
-
Teoderick C. reposted this🚀 Releasing the Splunk MCP / LLM SIEMulator (Windows v2) — a fully local Docker lab for AI/LLM security detection development. As AI systems become part of enterprise infrastructure, defenders need practical environments to build and test detections before attackers find the gaps. This tool gives you that environment. 🏗️ What's inside: • Splunk SIEM + Ollama LLM connected via Model Context Protocol (MCP) • Promptfoo for OWASP Top 10 LLM red team testing • OpenWebUI chat interface with AI-powered SPL query generation • Raw HEC log shipping for real-time event ingestion • Detection queries mapped to MITRE ATLAS techniques (AML.T0051, AML.T0054, AML.T0043, and more) 🛡️ Use it for: ✅ Developing detections for prompt injection, model exfiltration, and adversarial inputs ✅ Running OWASP LLM security assessments in a controlled lab ✅ Learning how MCP traffic looks in a SIEM ✅ Training blue teams on AI threat patterns — no cloud required https://lnkd.in/e--4-GyH #ai #strt #cisco #mcp #llm #splunk #splunkthreatresearchGitHub - rsfl/splunk-mcp-llm-siemulator: A Docker lab integrating Splunk SIEM with Ollama LLM via MCP for AI security operations. Features Promptfoo OWASP evaluation, TA-ollama and TA-mcp-jsonrpc add-ons, dual bind-mount log ingestion, and real-time HEC streaming across six indexes for MITRE ATLAS TTP detection.GitHub - rsfl/splunk-mcp-llm-siemulator: A Docker lab integrating Splunk SIEM with Ollama LLM via MCP for AI security operations. Features Promptfoo OWASP evaluation, TA-ollama and TA-mcp-jsonrpc add-ons, dual bind-mount log ingestion, and real-time HEC streaming across six indexes for MITRE ATLAS TTP detection.
-
Teoderick C. reposted thisTeoderick C. reposted this🚀 New Blog Alert (Part 2) Part 1 was all about getting the foundation right: building the lab, turning on Cisco Isovalent telemetry (Tetragon + Hubble), and streaming rich eBPF signals into Splunk Enterprise Security. Now it’s time for the fun part — proving what that visibility can actually catch. In Part 2: Splunking Isovalent Data — Attack Simulations and Detections, I run real-world, kubectl-driven attack simulations inside a Kubernetes cluster and validate how Tetragon’s kernel-level visibility turns into high-fidelity detections in Splunk. Each exercise maps back to MITRE ATT&CK for Containers, and highlights why eBPF is such a game changer: you get process lineage, syscall context, and workload-level attribution — the stuff traditional approaches often miss (especially in fast, ephemeral environments). 👉 In this post you’ll see: - Practical attack simulations you can run in your own lab (kubectl-based) - What telemetry to look for (ex: process_exec events via Tetragon/Hubble) - Example Splunk detections + how to hunt them - Why each behavior matters (and what it usually leads to in real incidents) 🎥 Bonus: I also experimented with AI video tools to create a short demo that summarizes the research — if you prefer a quick visual walkthrough, check that out too. Please hit me up incase you have any questions or need help with setting something similar for your research! Check it out here - https://lnkd.in/gnTEt2yW 🔐📊 #Kubernetes #CloudSecurity #eBPF #Splunk #Isovalent #ThreatResearch #K8sSecurity #DetectionEngineering #MITREATTACKSplunking Isovalent Data: Attack Simulations and Detections | SplunkSplunking Isovalent Data: Attack Simulations and Detections | Splunk
-
Teoderick C. reposted thisTeoderick C. reposted thisWant a cloud lab environment that's misconfigured on purpose? BadZure deploys #EntraID tenants and #Azure subscriptions populated with exploitable attack paths. Explore cloud tradecraft, run purple team exercises, or build and test your detections! I just shipped a major update: new privesc techniques, expanded Azure coverage, and documentation now live! https://badzure.com
-
Teoderick C. reposted thisTeoderick C. reposted thisThis threat actor used Facebook for domain fronting, so that infostealer traffic blends right into normal social media requests. And for whatever reason, the binary contains the exact same payload six times. Not six variants. Not six stages. The same thing, six times... Thought I'd do a quick writeup. Turned out to be 5,000 words. Link in the comments. #CyberSecurity #MalwareAnalysis #ThreatIntel #ReverseEngineering #InfoStealer
-
Teoderick C. reposted thisTeoderick C. reposted this🚀 Excited to share: Splunk Attack Range v5 is here! The security community just got a game-changing upgrade to their favourite security lab platform. Attack Range v5 brings cloud-powered security testing to your fingertips with some incredible new capabilities: What's New in v5: 🌐 Multi-Cloud Support: Now works seamlessly across AWS, Azure, and GCP - deploy your security labs wherever your infrastructure lives 🖥️ Three Ways to Deploy: Intuitive Web UI for quick setups, REST API for CI/CD integration andCommand line for power users 🔒 VPN-Only Access: Zero public internet exposure - all lab environments are secured behind WireGuard VPN with private IP addressing ⚡ One-Command Setup: Docker Compose gets you up and running instantly - no more complex local installations of Python, Ansible, or Terraform Why This Matters: Security teams can now: ✅ Build production-like lab environments in minutes ✅ Simulate real-world attacks using Atomic Red Team techniques ✅ Generate authentic telemetry for Splunk detection development ✅ Test purple team scenarios in isolated, safe environments ✅ Automate detection testing in CI/CD pipelines Whether you're a detection engineer tuning rules, running purple team exercises, or automating security tests, Attack Range v5 gives you a consistent, repeatable platform across all major clouds. The best part? It's completely open source and integrates with the broader Ansible Galaxy ecosystem for unlimited extensibility. Ready to level up your security testing game? 👀 Check out the full guide: https://lnkd.in/daJYTWyQ #Cybersecurity #ThreatDetection #CloudSecurity #SecurityTesting #Splunk #PurpleTeam #DetectionEngineering
-
Teoderick C. reposted this🚨 AI agents powered by Model Context Protocol (MCP) are creating a massive security blind spot. While MCP enables LLMs to access databases, filesystems, and APIs, it also introduces threats like SQL injection and privilege escalation that bypass traditional security controls. The Splunk Threat Research Team just released the MCP Technology Add-On to finally provide visibility into these previously invisible AI agent operations. As organizations rush to adopt AI, security teams must adapt—monitor MCP servers, enforce least privilege, and mandate logging for all agent interactions. The full technical breakdown and free TA are available here: https://lnkd.in/eS-ZJGAd #AISecurity #ThreatDetection #Splunk #MCP #CyberSecurity #strt #ciscoWhen AI Tools Turn Against You: Operationalizing MCP Server Security with the Splunk MCP TA | SplunkWhen AI Tools Turn Against You: Operationalizing MCP Server Security with the Splunk MCP TA | Splunk
-
Teoderick C. reposted thisTeoderick C. reposted thisDifferent RATs families, same playbook. 🐀 The Splunk Threat Research Team analyzed 18 malware families and found strikingly similar techniques. Understanding these patterns helps defenders focus on high-impact detection strategies instead of chasing individual threats. Read their analysis: https://splk.it/4tlnwJB #SplunkSecurity
-
Teoderick C. liked thisTeoderick C. liked thisThe FLARE Learning Hub freely distributes quality educational content on reverse engineering and malware analysis from the FLARE team. We are excited to share with the wider security community FLARE’s nearly two decades of experience in instructing thousands of students and professionals across higher education, private industry, government, and premier conferences. Our content emphasizes hands-on practice. Modules include demonstrations and lab exercises that reinforce the material, helping you integrate practical skills into your workflow. The modules are hosted as web-published Google Docs, while the GitHub repository contains all corresponding artifacts, including lab binaries, scripts, and disassembler databases. We are launching today with three modules: - Malware Analysis Crash Course: An adaptation of our foundational course that teaches the fundamental assembly skills and essential Windows knowledge necessary to begin reverse engineering Windows malware. - The Go Reverse Engineering Reference: A comprehensive reference for reverse engineering Go executables, including three reference sections: the implementation of Go language features, the Go runtime, and Windows Go executables. Additional Go content, including labs and demos, will be released later in the year. - An Introduction to Time Travel Debugging (TTD): This module applies WinDbg’s TTD technology to malware triage. TTD is a powerful but underutilized tool that can significantly speed up the analysis process and offer solutions to complex situations involving anti-analysis and obfuscation. This is a full release of content we previously shared through the blog post Time Travel Triage: An Introduction to Time Travel Debugging using a .NET Process Hollowing Case Study and through the Accelerating Malware Analysis with WinDbg Time Travel Debugging workshop at DEFCON 33. We plan to publish updates and corrections to existing modules on an ongoing basis. We also have additional modules in the pipeline for the remainder of the year, so check back frequently! 💻: https://bit.ly/48JcDbN
-
Teoderick C. liked thisTeoderick C. liked thisThe top 10 attack techniques from the 2026 CrowdStrike, Red Canary, and Mandiant reports are the same techniques from 2021. From 2019. From years before that. PowerShell. WMI. cmd.exe. RMM tool abuse. Scheduled tasks. Signed binary abuse. They're enumerated in public GitHub repos. They're versioned. They have machine-readable artifacts. And most of them are blockable today with tooling that already ships with Windows. We're not writing detections because we have to. We're writing them because we've convinced ourselves prevention is impossible, while the evidence stacks up in the other direction every single year. The average eCrime breakout time is now 29 minutes. The fastest observed: 27 seconds. At that speed, detect-and-respond isn't a strategy. It's a coin flip. New blog, we pulled the receipts. 👉https://lnkd.in/ermhemdF
-
Teoderick C. liked thisTeoderick C. liked this🤯 I’ve spent the last few months deep in a major retooling of my own reversing workflow. For a long time, I was stuck thinking I could only work with what the decompiler gave me—a limitation that many of us hit when facing modern, compiler-integrated obfuscation. This realization led me down a deep rabbit hole: working with intermediate representations (IR), sharpening my knowledge of Abstract Syntax Trees (ASTs), and even brushing up on a little linear algebra. In the process, I noticed a massive knowledge gap. Despite how critical these topics are for modern malware analysis, there are very few structured, formal learning paths. While there are excellent individual trainings and amazing blogs out there, I felt like I was back in time—hunting for pieces of tribal knowledge scattered across the internet. While I’ve certainly been utilizing LLMs to accelerate my research and tool generation, they aren't a shortcut for the analysis itself. I'm finding this area still requires a fundamental understanding of how these diverse topics converge into a single binary manifestation. After months of diving head-first into these abstractions, I’m pleased to announce the fruit of those struggles. I’ll be teaching "Syntactical Supremacy: Defeating and Designing Nation-State Obfuscation" at Black Hat this summer in Las Vegas. If you'd like to take a peek at what I've been working on, you can check out the syllabus below. Have questions? Don't hesitate to send me a message or drop a comment below :) 🔗 https://lnkd.in/gJqnNYmV
-
Teoderick C. reacted on thisTeoderick C. reacted on thisExcited to release Phoenix | Sigma Rule Intelligence Platform Check it out today - https://lnkd.in/eNGrcjVN Been working on this for a moment. The ultimate place to interact with SigmaHQ rules. I've bundled in a bunch of features. Here is a quick overview: - A new way to explore Sigma rules - Giving you a structured, interactive way to understand detections and breaking down logic, fields, and intent - Search & discovery - Quickly find rules by behavior, technique, or signal. - Convert rules leveraging the Sigconverter API on the fly. - Get your own author card with stats and information around your contribution. - Access testing data and linked simulation from Atomic Red Team And a bunch more things that I'll leave you to explore :D
-
Teoderick C. liked thisThis idea amazing specially for folks trying and collecting telemetry from attacks eg detection development but also test preventions in a safe space!
-
Teoderick C. liked thisTeoderick C. liked thisI recently came across two undocumented kernel driver samples on MalwareBazaar — both signed by Microsoft via the WHCP attestation program, both linked to the same Chinese developer account: 陕西阿牛创汇网络科技有限公司 (Shaanxi Aniu Chuanghui Network Technology Co., Ltd.). The two samples are Core64.sys (signed Jan 2025) and EtwTraceHook.sys (signed Feb 2025). The second name is particularly telling — ETW (Event Tracing for Windows) is the telemetry backbone used by virtually every EDR and AV product. Hooking or disabling it means going dark for most security tooling. Static analysis reveals both drivers expose an identical IOCTL interface built on four kernel primitives: 1000 — resolve any kernel export by name via MmGetSystemRoutineAddress 1001 — call an arbitrary kernel function pointer with up to 4 arguments 1002 — write a value into an internal kernel table (~100k entries) 1003 — read from the same table Combined, these primitives give a userland client full ring-0 capability: resolving and calling any kernel function enables process termination bypassing PPL, ETW provider patching to blind EDR telemetry, and kernel memory manipulation. The internal table (read/write commands) likely serves as a shared state store between the driver and its loader component — possibly caching resolved addresses or storing hook targets. The stealth mechanism is particularly interesting: the IRP_MJ_CREATE handler immediately deletes both the device object and its symbolic link on first access. After the first CreateFile(), the device vanishes from \\.\ entirely — invisible to WinObj, handle scanners, and most EDR visibility layers. The signing method mirrors the POORTRY technique documented by Mandiant, Sophos and SentinelOne in 2022-2023: illicitly obtained developer accounts used to push malicious drivers through Microsoft's WHCP attestation process, resulting in a valid Microsoft-issued signature. These two samples follow the exact same playbook — same account, two builds one month apart, neither attributed to a known family. IOCs: 17aae57cf6255c7eb169bf62ea67376d9708976eb7831f8cdd0ea38bdcb37dc4 — Core64.sys 6ae294cb5c71118350342e6a26350d0e95ea23d0548125b09056efa0ea19bf45 — EtwTraceHook.sys #malwareanalysis #byovd #kernelsecurity #threatintelligence #windowsinternals #dfir #etw #poortry
Recommendations received
1 person has recommended Teoderick
Join now to viewView Teoderick’s full profile
-
See who you know in common
-
Get introduced
-
Contact Teoderick directly
Other similar profiles
Explore more posts
-
Do Van Son
SecurityOnline • 302 followers
The Apache Tika toolkit, the industry standard for detecting and extracting metadata from over a thousand file types, has issued a maximum-severity alert. A critical XML External Entity (XXE) vulnerability, tracked as CVE-2025-66516, poses a catastrophic risk to applications relying on Tika for content analysis. With a CVSS score of 10.0, this flaw allows attackers to compromise servers simply by uploading a malicious PDF.
2
-
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
9
1 Comment -
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
6
1 Comment -
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
3
-
Cybrlytics Technology
10K followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
2
-
Hadrian
10K followers
Are you measuring the risks that really matter? Traditional assessments rarely capture the sequence of actions attackers use to exploit gaps. At RSAC 2026, we’ll explore how simulating real attacker behavior uncovers exposure hiding in plain sight. Using insights from the 2026 Offensive Security Benchmark Report, we’ll break down reconnaissance, attack paths, and exploitation steps that quantify real enterprise risk. Our CEO, Rogier Fischer, along with our team of experts Matan Shavit and Guy Stockwell, will be at Moscone Center, San Francisco, March 23‑26, sharing these insights with professionals tackling the same risks. If you want to map your blind spots before attackers do, book a time with our team at the conference: https://lnkd.in/e_4dMt2F #RSAC2026 #RSAC #Cybersecurityevents
20
1 Comment -
Curios
974 followers
In modern cloud environments, patching every CVE isn’t just unrealistic - it’s inefficient. Attackers don’t target every vulnerability. They target the ones you left exposed. That’s why the smartest teams are moving to risk-based vulnerability management, combining CVSS with real world context to prioritize what truly matters. 🔹 Focus on internet-facing workloads. 🔹 Automate prioritization in container pipelines. 🔹 Measure success by remediation time, not patch volume. The result? A 70% reduction in workload, and a stronger security posture. #CloudSecurity #VulnerabilityManagement #Curios #Tenable
4
1 Comment -
Anchore
4K followers
The next critical CVE isn't a question of if, but when. Will your team be running a war room with 13 different teams frantically debugging permission issues across dozens of clusters? Or will you run a single query against your SBOM inventory and let your policy engine handle remediation recommendations? Learn how Anchore Enterprise transforms CVE response in our latest article. 🔗 https://lnkd.in/etSgZw2K #SBOM #VulnerabilityManagement #SupplyChainSecurity #DevSecOps
3
-
Taylor Walton
SOCFortress • 3K followers
You might be feeling frustrated by the endless struggle of getting Sigma detection rules to work seamlessly in your open-source SIEM stack. It probably feels like every new rule demands manual conversions, special configs, and a ton of guesswork. It can be exhausting--and I’ve definitely been there. In this walkthrough I introduce how we can incorporate Velociraptor DFIR to solve our Sigma challenge. I share how I set up automated scans, tackled noisy detections, and fed alerts into my incident-response workflow (CoPilot). https://lnkd.in/gX5-X_mN
90
3 Comments -
Offensive Security Manager
758 followers
We used Offensive Security Manager’s real-time risk scoring to triage a live incident and cut mean-time-to-remediate dramatically. Step 1: the platform auto-scored alerts using contextual ML—no manual tagging. Step 2: priorities shifted dynamically as threat context evolved, and responders were re-assigned in seconds. Step 3: every decision and score was logged for audit-ready evidence. The result: faster, repeatable response, less manual triage, and clearer risk posture reporting for leadership. Learn how this improves operational speed and compliance: https://wix.to/yghzGp7 🔒📊 #Cybersecurity #IncidentResponse #RiskManagement
3
-
CVERiskPilot
2 followers
CVERiskPilot Beta 2.0 is live. We built CVERiskPilot to help security teams turn raw vulnerability exports into evidence-backed, reviewable remediation decisions without overstating certainty. Beta 2.0 includes: - Multi-tenant authenticated workflows - Uploads for JSON, SARIF, CSV, and XLSX - Findings triage and deep review - Remediation ticket workflows - Executive reporting - Billing and release-readiness foundations - Auditor-facing self-assessment and evidence-tracking views What matters most to us is trust: - Clear tenant isolation boundaries - Reviewable workflows - Advisory AI, not black-box automation - Evidence-oriented operations and release discipline This is still beta, and we’re treating it like beta: real workflows, real hardening, real feedback loops. If you lead vulnerability management, platform security, or security operations and want early access or want to help shape the product, we’d love to connect. #CyberSecurity #VulnerabilityManagement #AppSec #SecurityOperations #DevSecOps #SaaS #B2B #BetaLaunch
1
-
Cobalt
36K followers
Progress isn't always linear, but your offensive security strategy should be. Our 7th annual State of Pentesting Report uncovers why critical vulnerabilities are slipping through the cracks—especially with new #genAI risks emerging. Build your action plan. Learn why knowledge from expert-led pentesting is power. Download the report and transform assumptions into actionable clarity. 🔗: https://hubs.la/Q03vrqqM0
18
-
Caitlin Condon
VulnCheck • 4K followers
It's VulnCheck Friday! This week's release has new goodies now available to Initial Access Intelligence customers, including: • Signatures for 5 CVEs observed in the wild by VulnCheck canaries • A use-after-free exploit for Redis CVE-2025-49844 (a beefy boi) • Exploits, signatures, PCAPs, and queries for Linksys E1700, Belkin F9K1122, and SAP SCIMono https://lnkd.in/ec5We7Bd
25
-
Ivan Ristić
Red Sift • 3K followers
Version numbers in protocols are dead. In the TLS land, we used to call this protocol version intolerance. TLS 1.3 had to abandon advancing the version number because too many servers would have rejected the handshake. I measured this problem back in 2015 as part of SSL Pulse (one of the SSL Labs' projects), trying different version numbers against top domain names. A whopping 60% of TLS servers would have rejected "2.0" if offered as the handshake version number. Version "1.3" fared better, at "only" 12%. Abandoning the version number change dropped this further to 3.2.%. Further protocol changes were made subsequently to reduce this number even further.
28
-
DeployHub
446 followers
Your offensive security tools are finding vulnerabilities. But what happens when the next CVE drops after deployment? Most organizations discover they’re running vulnerable open-source packages months after threats surface. By then, attackers already have tactical advantage. DeployHub’s defensive approach changes the game: Real-time threat mitigation across your entire software supply chain, Application-level SBOMs that map vulnerabilities to active endpoints, CVE remediation in minutes, not months. While competitors focus on pre-deployment scanning, we maintain operational endpoint tracking for threats that emerge post-deployment. Our open-source vulnerability management platform gives you tactical control when it matters most. Don’t just scan for threats. Neutralize them. #OpenSourceSecurity #VulnerabilityManagement #DevSecOps #SBOM #CyberThreat #AppSec https://cstu.io/d83c75
1
-
Certified Threat Modeling Professional (CTMP)
4K followers
Most organizations treat incident response (IR) as a checklist. But attackers don’t follow checklists. That’s where threat modeling comes in—giving IR teams the ability to: 🔍 Spot attack paths before adversaries use them 📊 Simulate attacker behavior across the kill chain ⚡ Prioritize high-impact risks 🛡️ Build defenses that adapt as threats evolve 👉 Read more from OWASP’s Threat Modeling resources: https://lnkd.in/gFBEcsy9 📌 If you like our posts, follow Certified Threat Modeling Professional (CTMP). We regularly create & share tips/resources & content on DevSecOps, Container Security, Threat Modeling, Cloud Native, & more. #ThreatModeling #IncidentResponse #CyberSecurityStrategy #ProactiveDefense #TripwireInsights
14
1 Comment -
Unveil Security Group, LLC.
660 followers
Most breaches start with a click - not a firewall failure. UNVEIL simulates phishing, impersonation, and social engineering tactics to identify human vulnerabilities and help your teams build real resilience. No blame. No shaming. Just insight, education, and stronger defenses.
1
-
Wiz
401K followers
Zero-Day vulnerabilities like #React2Shell prove the importance of acting fast and removing exploitable risk before it becomes a threat. ⏱️ Wiz ASM gives SOC teams 'Validated External Risk Issues', high-fidelity alerts that reveal exploitable paths from the outside, so you can act before an incident happens. With Wiz ASM, you can: • Eliminate exploitable risks before attackers do. • See the blast radius of external threats in your environment. • Remediate fast with full context and ownership. 🔗 https://lnkd.in/eabWapHN
160
1 Comment -
Alon Gal
Hudson Rock • 20K followers
⚠️ EmEditor users... "In a security incident notice posted on the official website on December 22, the software’s developers warned that individuals who had downloaded EmEditor using the ‘download now’ button between December 19, 18:39 PT, and December 22, 12:50 PT, may have been served a malicious installer." via SecurityWeek - https://lnkd.in/dZ-s4pzf
23
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content