ioc.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
INDICATORS OF COMPROMISE (IOC) InfoSec Community within the Fediverse. Newbies, experts, gurus - Everyone is Welcome! Instance is supposed to be fast and secure.

Administered by:

Server stats:

1.3K
active users

#cybersecurity

1.6K posts500 participants12 posts today
Finalizamos la segunda sesión del Curso Fundamentos de Hacking Ético 2025. Información: https://www.reydes.com/e/Curso_de_Hacking_Etico Información (PDF): https://www.reydes.com/archivos/cursos/Curso_Hacking_Etico.pdf ¡Gracias a todos los participantes! #cybersecurity #hacking #readteam #bugbounty #forensics #osint

Has anyone ever tried to trick malware into thinking the host it’s running on is in Russia? For example, reverse engineering and then spoofing the ip-api.com api to always return “RU” on your network. This seems like the kind of trickery that @SwiftOnSecurity would try. 😃

#cybersecurity

From: @threatinsight
infosec.exchange/@threatinsigh

Infosec ExchangeThreat Insight (@threatinsight@infosec.exchange)Attached: 1 image Proofpoint researchers recently discovered an infostealer in our data that we originally dubbed "Aurotun" (named for a misspelling of "autorun" in its strings). After collaboration with Intel 471 and others, we believe that this malware is actually MonsterV2, a newer version of an existing infostealer. MonsterV2 has many capabilities, but seems to function primarily as a stealer and a loader. It has the capability to collect system info (such as OS version and CPU and GPU model information), and steal browser data, logins and tokens from Steam, Discord, and Telegram, crypto wallets, credentials and credit card data from browser autofills, among other data. MonsterV2 can also act as a loader—we've seen it drop new variants of StealC and Rhadamanthys. In addition, some samples of MonsterV2 check to see if the target resides in a CIS country (RU;BY;UA;KZ;UZ;TM;KG;AM;TJ;MD;LV;LT;EE). It checks this to prevent infection of targets in these countries. To get the target's geolocation, the malware makes a call to http://ip-api[.]com. See our screenshot below for configuration examples. Example hashes: 666944b19c707afaa05453909d395f979a267b28ff43d90d143cd36f6b74b53e b869941a9c476585bbb8f48f7003d158c71e44038ceb2628cedb231493847775 Signatures: ET sig: 2061200 - ET MALWARE MonsterV2 Stealer CnC Checkin
Spotify for CreatorsJorge Reyes: From Atmospheric Sciences to Cybersecurity by Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, Jorge Reyes shares his journey into cybersecurity, discussing his background in atmospheric sciences, the importance of mentorship, and the value of teaching. He emphasizes the significance of hands-on experience, the necessity of understanding different domains within cybersecurity, and the importance of networking. Jorge also provides practical advice for aspiring cybersecurity professionals, highlighting the need for continuous learning and proactive career management.Takeaways• Sharing experiences can save others time in learning.• Mistakes are essential for growth and learning.• Internships provide valuable hands-on experience.• Teaching helps reinforce knowledge and communication skills.• Understanding different domains in cybersecurity is crucial.• Networking is key to finding opportunities.• Proactive career management leads to better outcomes.• Continuous learning is necessary in the tech field.• Hands-on experience is vital for skill development.• Being open to diverse projects enhances career growth.Sound Bites• "Teaching is very fulfilling."• "You have to continuously learn."• "Be open to not get siloed."Resourceshttps://www.linkedin.com/in/jrsec/https://jrsec.github.io/2022-09-29-cybersecurity-entry-level-plan/https://www.amazon.com/Extreme-Ownership-U-S-Navy-SEALs/dp/1250067057
Iniciamos la segunda sesión del Curso Fundamentos de Hacking Ético 2025. Información: https://www.reydes.com/e/Curso_de_Hacking_Etico Información (PDF): https://www.reydes.com/archivos/cursos/Curso_Hacking_Etico.pdf #cybersecurity #hacking #readteam #bugbounty #forensics #osint