June 21, 2025
June 21, 2025
Your average non-state APT doesn't use browser exploits for initial access. They don't give a shit about the kernel or the EDR, they don't deploy rootkits.
β Cerbersec (@cerbersec) June 20, 2025
They use phishing/breached creds w/ VPN, pwn your ADCS , then delete your backups and deploy ransomware, all loud as fuck https://t.co/t7LC9wjjSq
Injectso supports injecting Lua into a process
GitHub - stealth/injectso
Contribute to stealth/injectso development by creating an account on GitHub.
Look in the contrib directory.
https://cetas.turing.ac.uk/publications/limits-digital-representations-battlefield
Another Week, Another EXPLOITS CLUB π°
β exploits.club (@exploitsclub) June 20, 2025
---
π Binja giveaway: sign up to support the newsletter π
---
Tesla wall charger falls to @Synacktiv @bugscale pops a Chrome bug@binarly_io Secure Boot bypass
RCE from @watchtowrcyber
+ Jobs & MORE πhttps://t.co/TnLIit1Hge
You can find my slide deck for @TheOffensiveX on GitHub. I also included a minimalist extension that you can build on and will load in any of the VSCode forks on any platform π¨βπ»βοΈ pic.twitter.com/2FF0VrdGKZ
β b33f | πΊπ¦β (@FuzzySec) June 20, 2025
Weβre sharing these results as part of our policy of βred-teamingβ AI models and transparently sharing the risks we observe.
β Anthropic (@AnthropicAI) June 20, 2025
In our report, we discuss a range of extra results, scenarios, and mitigation strategies: https://t.co/XFtd0H2Pzb
Microsoft has continuously observed hybrid attacks leading to espionage, business interruption, and ransomware deployment that involve threat actors moving from on-premises environments to the cloud. Many organizations manage their resources across different realms, including⦠pic.twitter.com/jJ64gIUTqA
β Microsoft Threat Intelligence (@MsftSecIntel) June 20, 2025
Paged Out! #6 β now in print
β PagedOut (@pagedout_zine) June 20, 2025
Two editions:
π’ Regular
π Sponsor Edition β full-back badge in Gold, Platinum or Diamond
Same content. Different legacy.
π https://t.co/RoJJnVAYnY#PagedOut #printondemand #opensource #techzine pic.twitter.com/QLzAkx1AvB
Releasing this fun tool Golem based on @0xdea, LLVM, LLM and @semgrep
β 2OURC3 (@2ourc3) June 20, 2025
Golem automates C/C++ vulnerability discovery by combining Semgrep rule scans, LLVM call-graph & CFG slicing, and AI-driven context analysis.
Tool: https://t.co/BX9a2nSZXi
Article: https://t.co/K5MKAfMPje
Is it a crime to aid and abet North Korean state sponsored Threat Actots? pic.twitter.com/toXHpffdDa
β vx-underground (@vxunderground) June 21, 2025