Sometimes the call comes a little too late and you gotta do what you gotta do ๐
Sometimes the call comes a little too late and you gotta do what you gotta do ๐
๐๐๐ป๐ ๐ณ๐ผ๐ฟ ๐๐ต๐ถ๐ ๐ฏ๐ ๐น๐ผ๐ผ๐ธ๐ถ๐ป๐ด ๐ฎ๐:
โข Chrome/Edge running on servers where they shouldn't be
โข Browser profile directory access by non-browser processes
โข Outbound HTTPS to api.telegram.org from unexpected executables
โข Startup persistence under AppData or ProgramData without operational justification
I'm using TelePeek.com to monitor the receiving interface (screenshot shows operator's dashboard). The victim profile is concerning with government employees and enterprise users in high-level organizations...
Exfiltration via Telegram bot API where PhantomStealer packages victim data as JSON and POSTs directly:
โข Browser credentials, cookies, saved passwords
โข System metadata (OS, username, antivirus status)
โข Network reconnaissance (gateway/internal/external IPs)
Phantom Stealer has been prominent across phishing campaigns over the past two weeks. Operationally interesting to me is that itโs not just an infostealer. It also acts as an initial access broker, dropping GuLoader for follow-on activity, and Iโve seen it deploy crypto miners as well.
Worth reading if you're running AI in CI/CD.
github.com/cline/cline/...
Clinejection PoC: researcher proved you can compromise a VS Code extension (700k+ weekly users) via prompt injection in GitHub issues.
He was kind enough to install harmless software as a POC. Real attackers won't...
Vendor ignored him for 47 days, fixed it in 30 min after he went public.
Upgrade to 6.0.0 especially if other people can write MDX that your server then compiles and renders for them.
CVE with 8.8 score
- discuss.hashicorp.com/t/hcsec-2026...
MDX content is awesome, I love it, and I use it whenever I can on my projects. But be careful cause if youโre usingย next-mdx-remoteย (4.3.0โ5.x) to serverโside render untrusted MDX, youโre potentially exposing yourself to RCE via CVEโ2026โ0969...
...the missing layer.
Full write-up: www.edr-telemetry.com/blog/Why-You...
At EDR Telemetry project, we spend a lot of time measuring what EDRs can see. This article is about what they still cannot safely stop.
From LOLBAS to vulnerable drivers to unauthorized RMMs, I walk through the real-world gaps we keep seeing in telemetry and why application control is...
In the screenshot below, you can see an example of this Skill in use (I'm using GPT 5.2-low in Codex)
Link to the skill: github.com/tsale/awesom...
We have added a new analysis Skill thanks to @BlueTeamSteve! This skill can be used to quickly and accurately map the MITRE ATT&CK tactic and technique to threat behaviors and indicators you enter in the prompt, saving you a ton of time!
Weโve also expanded ๐๐ป๐๐ฒ๐ฟ๐ฝ๐ฟ๐ถ๐๐ฒ options for organizations that need additional flexibility, scale, and support on top of the Advanced tier.
Check out the new tiers now: www.edr-comparison.com/pricing
๐ช๐ฎ๐๐ฐ๐ต๐๐๐ฎ๐ฟ๐ฑ ๐๐๐ฅ. Weโve also introduced ๐๐ฎ๐๐ถ๐ฐ ๐ฎ๐ป๐ฑ ๐๐ฑ๐๐ฎ๐ป๐ฐ๐ฒ๐ฑ ๐๐ถ๐ฒ๐ฟ๐ to better reflect how different users engage with the platform. With the ๐๐ฑ๐๐ฎ๐ป๐ฐ๐ฒ๐ฑ ๐๐ถ๐ฒ๐ฟ, weโre introducing a deep dive into the technical justification and expert analysis behind every single feature in our comparison.
Since launching in November, the platform has already helped hundreds of consultants and enterprises navigate the complexity of EDR selection.
This release pushes things forward with a cleaner comparison UX, deeper evaluation context using MITRE ATT&CK evaluation data, and a new vendor added:
๐๐๐ฅ ๐๐ผ๐บ๐ฝ๐ฎ๐ฟ๐ถ๐๐ผ๐ป ๐ฃ๐น๐ฎ๐๐ณ๐ผ๐ฟ๐บ ๐จ๐ฝ๐ฑ๐ฎ๐๐ฒ: ๐ก๐ฒ๐ ๐๐ป๐๐ฒ๐ฟ๐ฎ๐ฐ๐๐ถ๐๐ฒ ๐๐ผ๐บ๐ฝ๐ฎ๐ฟ๐ถ๐๐ผ๐ป ๐๐
๐ฝ๐ฒ๐ฟ๐ถ๐ฒ๐ป๐ฐ๐ฒ, ๐ ๐๐ง๐ฅ๐ ๐๐ง๐ง&๐๐ ๐๐ป๐๐ถ๐ด๐ต๐๐, ๐ฎ๐ป๐ฑ ๐ช๐ฎ๐๐ฐ๐ต๐๐๐ฎ๐ฟ๐ฑ ๐๐๐ฅ
We want to start by thanking everyone who supported us as early adopters.
Feel free to contribute and use these skills to save a ton of time, like we already do.
github.com/tsale/awesom...
Learn about skills:
- developers.openai.com/codex/skills/
- support.claude.com/en/articles/...
๐๐๐๐ ๐น๐ฎ๐๐ป๐ฐ๐ต๐ฒ๐ฑ ๐ฎ๐๐ฒ๐๐ผ๐บ๐ฒ-๐ฑ๐ณ๐ถ๐ฟ-๐๐ธ๐ถ๐น๐น๐ ๐๐ถ๐๐ต @fr0gger_ !
Designed to save time during investigations and everyday DFIR tasks
Thomas has built an excellent malware triage skill, and Iโve added a couple of timeline analysis skills to help you get started.
github.com/tsale/EDR-Te...
This is exactly the kind of vendor collaboration the project aims to promote.
PR with full details and artifacts:
github.com/tsale/EDR-Te...
Big thanks to the C-Prot team for setting a strong example for Linux EDR transparency.
environment, validated event mappings, and publishedย the raw logs from the evaluation so the community can independently verify everything.
Artifacts included:
โข Real production telemetry logs
โข Some screenshots from the platform
Validation material to reproduce the results can be found under
Weโve just added ๐-๐ฃ๐ฟ๐ผ๐ EDR to the EDR Telemetry Project and it sets a new bar for Linux telemetry!
C-Prot is currently #1 in the Linux EDR table, with exceptional depth and quality of raw telemetry. What really stands out is the level of transparency: we got direct access to a production...
Be careful what you install and avoid using skills from unknown or unverified libraries.
Read more about skills here:
- support.claude.com/en/articles/...
- developers.openai.com/codex/skills/
One quick caveat tho, as skills libraries become more popular, where you will be able to search and find the right skill you want to install, weโre likely going to see malicious skills pop up that download and execute malware...
Claude set a strong bar for structured, workflow-driven AI usage, and itโs no surprise weโre now seeing similar ideas across other platforms like OpenAI.
Iโve built DFIR and quick triage workflows that save me hours every time! The time savings really add up, and itโs completely changed how I work.
Pretty ๐
Merry Christmas everyone! Hope everyoneโs enjoying some downtime ๐
Much of it remains applicable today, along with the threat hunting series, which Iโm especially proud of.
Iโve moved all of my blog posts from Medium to a new blog section on my personal website.
If youโre looking for a good read, Iโd recommend my Cobalt Strike write-ups (Part 1 & Part 2) from 2021โ2022.
kostas.page/blog/cobalt-...