Ever wonder what a WiFi Pineapple is? Or, how it got its name? Read on to find how hackers use WiFi Pineapples and how to defend against Pineapple attacks.| www.threatlocker.com
Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard that has been ongoing since at least 2024, targeting embassies in Moscow using an adversary-in-the-middle (AiTM) position to deploy their custom ApolloShadow malware.| Microsoft Security Blog
Microsoft reveals Russia's Secret Blizzard (Turla) hackers are using ISP-level access to spy on Moscow embassies with custom malware, posing a major risk to diplomats.| WinBuzzer
Discover the fundamentals of pentesting Active Directory Domain Services on Linux with a thorough tour of Altered Security's LinuxAD lab.| tbhaxor's Blog
Duo Trust Monitor is a threat detection feature focused on surfacing valuable and actionable security events to Duo administrators. Learn more.| Duo Security
Cisco is aware of new activity targeting certain Cisco Adaptive Security Appliances (ASA) 5500-X Series and has released three CVEs related to the event. We assess with high confidence this activity is related to same threat actor as ArcaneDoor in 2024.| Cisco Talos Blog
Attackers are turning up the heat with advanced TTPs like Adversary-in-the-Middle (AiTM) phishing attacks to steal session cookies and bypass MFA security.| zvelo