Built on 30M+ download open source tools (Syft & Grype)
Community-proven, enterprise-hardened
Built on 30M+ download open source tools (Syft & Grype)
Community-proven, enterprise-hardened
These mathematical incantations are not nearly as formidable as many #cybersecurity warriors fear. Learn the basics of elliptic-curve cryptography. https://cromwell-intl.com/cybersecurity/elliptic-curve-cryptography/points-on-a-curve.html?s=mc
#SessionPro Beta: Development Update
https://getsession.org/blog/pro-beta-development-update-august
Wizardry lets you speak with those far away. Other wizardry eavesdrops on these discussions. #cybersecurity https://cromwell-intl.com/cybersecurity/comsec.html?s=mc
Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open
A routine monitoring by researchers uncovered an exploitation attempt on a honeypot server running TeamCity, a CI/CD tool. The attack exploited an exposed Java Debug Wire Protocol (JDWP) interface, leading to remote code execution, deployment of cryptomining payload, and establishment of multiple persistence mechanisms. The attack was notable for its rapid exploitation, use of a customized XMRig payload, and stealthy crypto-mining techniques. JDWP, designed for debugging Java applications, becomes a high-risk entry point when exposed to the Internet without proper authentication. The attackers used a structured sequence to achieve remote code execution, likely using a variant of jdwp-shellifier. They deployed a dropper script that installed an XMRig miner and set up various persistence mechanisms including boot scripts, systemd services, cron jobs, and shell configuration files.
Pulse ID: 68962f0f91f8829022afff4a
Pulse Link: https://otx.alienvault.com/pulse/68962f0f91f8829022afff4a
Pulse Author: AlienVault
Created: 2025-08-08 17:08:31
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
Leak Reveals the Workaday Lives of North Korean IT Scammers
https://www.wired.com/story/leaked-data-reveals-the-workaday-lives-of-north-korean-it-scammers/
National Cybersecurity Agency - Implements the National Cybersecurity Policy Action Plan 2023-2028.
Any #infosec folks wanna help me with some decent data to backup the following point? I am trying to make the point to some executives that a #password policy requiring minimum 8 characters with 1 symbol, mixed case, and 1 number is just not reasonable in 2025. (I'm commenting on another company's policy, not my own!)
What is a good example of a policy (e.g., NIST 800-63 or whatever) that said 49 bits was no good?
I currently say: 49 bits of entropy was unacceptably low in 2005. It is unthinkably low in 2025. What can I point to that might resonate better than "bits of entropy?"
Using the classic method with Shannon's estimate, I figure it's on the order of 49 bits of entropy but that's only if it's purely random from the full character set, and we konw that's not true.
I'm not looking for rhetorical suggestions. I'm good at rhetoric. I'm looking for references I can point to (like "XYZ published in 2011 that the minimum acceptable password was 56 bits of entropy")
feel free to boost for fun
#security #cybersecurity
A coordinated cyberattack.
Fake #WhatsApp developer libraries hide destructive data-wiping code
Some wizards conjure numbers from patterns of speech. But does this help in #cybersecurity battles? https://cromwell-intl.com/cybersecurity/attack-study/textual-analysis-for-pattern-detection.html?s=mc
15,000 #Jenkins servers are exposed to a critical RCE flaw (CVE-2025-53652) in the Git Parameter plugin. Researchers warn attackers could fully compromise vulnerable systems.
https://hackread.com/jenkins-servers-risk-rce-vulnerability-cve-2025-53652/
We’ve just dropped the first draft agenda for @hack_lu ! The conference is taking place over 4 days (from Tuesday 21st October 2025 until the 24th October 2025)
This year’s edition is going to be wild, expect mind-blowing talks, hands-on workshops, extra CTF challenges during the conference, and plenty of fun activities.
Check it out and start planning your adventure!
FLASH GIVE
We're giving away this set of #defcon patches to the first two people that request a #Graylog demo at our Blue Team Village table!
#defcon33 #hackersummercamp #SIEM #cybersecurity
AI is transforming tech workflows—67% of orgs say so.
The smartest aren’t replacing talent. They’re retraining it.
Upskilling = 38% faster than hiring
Boosts retention & innovation
Download the 2025 Tech Talent Report:
https://training.linuxfoundation.org/2025-state-of-tech-talent-report/
Microsoft only cares about money and it doesn't bother to hide it any more.
"One: [Microsoft products] are everywhere within our digital ecosystem. And two: they are so vulnerable that the Chinese familiarity of them makes it a door already open. So that's what gives me the political aneurysm here."
The Register: Ex-White House cyber, counter-terrorism guru: Microsoft considers security an annoyance, not a necessity https://www.theregister.com/2025/08/08/exwhite_house_cyber_and_counterterrorism/ @theregister #Microsoft #cybersecurity #Infosec
#Microsoft's $30 #Windows10 Security Updates Cover 10 Devices
#Encryption Made for #Police and #Military Radios May Be Easily Cracked
This dumb password rule is from Trenord.
- Password must consist of 8-16 characters
- Must contain 3 out of 4 of the following: lowercase characters, uppercase character, digits (0-9), and one or more of the following symbols: @#$%^&*-_+=[]{}|\:',?/`~“();.