BLUE
FD
Fran Donoso
@francisck.bsky.social
I'm an infosec person who currently works as the CTO of a security services firm. Have done DevSecOps, Red Teaming, and reverse engineering. I reversed some of the tooling leaked by the Shadow Brokers and spoke about it publicly
180 followers107 following90 posts
Reposted by Fran Donoso
ADalex.leetnoob.com
Reposted by Fran Donoso
TSshadowserver.bsky.social

UPDATE: Cisco IOS XE Web UI CVE-2023-20198 version 3 BadCandy implant detection scans up and running (hat tip to LeakIX). Total implant detections at around 26.5K unique IPs. Dashboard tracker: dashboard.shadowserver.org/statistics/c...

1
FDfrancisck.bsky.social

Yes, I am not sure how to share that privately however, so I may look at your link tree and ping you separately

1
Reposted by Fran Donoso
TSshadowserver.bsky.social

Sharp increase in queries for "/oauth/idp/.well-known/openid-configuration" endpoint associated with Citrix NetScaler CVE-2023-4966 (leaking of session tokens) observed by our honeypot sensors. This is after recent Assetnote assetnote.io/resources/re... publication.

1
FDfrancisck.bsky.social

Oh yeah, all of their tools are free.

0
FDfrancisck.bsky.social

Welcome to our lives šŸ™ˆšŸ«£šŸ˜£

0
FDfrancisck.bsky.social

Iā€™m a big fan of Objective-Seeā€™s MacOS security tools. Knockknock is an on demand scanner that finds weird things: objective-see.org/products/kno...objective-see.org/products/blo... Both do require some tech knowledge

BlockBlock
BlockBlock

Protection Against Persistent Mac Malware

1
FDfrancisck.bsky.social

Hey Frank, sure! I run an infosec feed here in Bluesky (how I found your post) and work in infosec. Would love to hear about this Wordpress attack

1
FD
Fran Donoso
@francisck.bsky.social
I'm an infosec person who currently works as the CTO of a security services firm. Have done DevSecOps, Red Teaming, and reverse engineering. I reversed some of the tooling leaked by the Shadow Brokers and spoke about it publicly
180 followers107 following90 posts