Welcome
**HAPPY NEW YEAR!!**
Welcome and Happy Holidays and Happy New Year!
We hope that you had a Happy Holiday and continue to have a Safe and Happy New Year.
Thank you to all who attended our Holiday Dinner. Food was GREAT and good times were had!
Next Meeting is January 25, 2024, Virtual, 7pm. Register on our site. ISC2CT.org
Thank you for your support.
GitTech (Use Caution)
GitHub - 0xsp-SRD/mortar: evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)
evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR) - GitHub - 0xsp-SRD/mortar: evasion technique to defeat and divert detection and prevention of secu...
GitHub - h0tak88r/submonit88r: Tool that monitor new subdomains from crt.sh and sends the new subs found to discord
Tool that monitor new subdomains from crt.sh and sends the new subs found to discord - GitHub - h0tak88r/submonit88r: Tool that monitor new subdomains from crt.sh and sends the new subs found to d...
Cyber News
Iran's 'Peach Sandstorm' Cyberattackers Target Global Defense Network
FalseFont backdoor allows operators to remotely access an infected system and launch additional files.
5 pivotal cybersecurity trends for 2024 - Help Net Security
Confronting the cyberattacks that AI systems enable will be a critical business objective throughout 2024.
3 main tactics attackers use to bypass MFA - Help Net Security
SE Labs advised CISOs to step up against attacks on systems protected by MFA in response to increased attacker activity.
Microsoft inches closer to glass storage breakthrough that could finally make ransomware attacks impossible in the data center and hyperscalers — but only Azure customers will benefit from it | TechRadar
The technology is strikingly similar to ceramics-based storage and may replace current day technology soon
Researchers use AI chatbots against themselves to 'jailbreak' each other
Computer scientists from Nanyang Technological University, Singapore (NTU Singapore) have managed to compromise multiple artificial intelligence (AI) chatbots, including ChatGPT, Google Bard and Microsoft Bing Chat, to produce content that breaches their developers' guidelines—an outcome known as "jailbreaking."
MITRE Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure - SecurityWeek
MITRE and partners unveil EMB3D, a new threat model designed for critical infrastructure embedded devices.
Trace Labs | Search Party
What is Search Party CTF? Harnessing the Wisdom of the Crowd The Trace Labs Search Party CTF is a non theoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help find missing persons
An Introduction to Bypassing User Mode EDR Hooks
Understanding the basics of user mode EDR hooking, common bypass techniques, and their limitations.
r-tec Blog | Evade signature-based phishing detections - r-tec Cyber Security
Phishing attacks are still the most used attack vector for initial access and credential stealing from our perspective. As phishing attempts become more frequent and sophisticated, so do vendors with detection/prevention features..
Decoy Microsoft Word Documents Used to Deliver Nim-Based Malware
A new phishing campaign is using Microsoft Word docs as bait to deliver Nim-based malware.