Kostas's Avatar

Kostas

@kostastsale

Running โžก http://defendpoint.ca | http://edr-telemetry.com | https://edr-comparison.com/ | http://detectionstream.com | ๐Ÿ‡ฌ๐Ÿ‡ท๐Ÿ‡จ๐Ÿ‡ฆ

1,394
Followers
128
Following
450
Posts
19.09.2023
Joined
Posts Following

Latest posts by Kostas @kostastsale

Video thumbnail

Sometimes the call comes a little too late and you gotta do what you gotta do ๐Ÿ˜‚

06.03.2026 13:15 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Bots: An introduction for developers Bots are small applications that run entirely within the Telegram app. Users interact with bots through flexible interfacesโ€ฆ

๐—›๐˜‚๐—ป๐˜ ๐—ณ๐—ผ๐—ฟ ๐˜๐—ต๐—ถ๐˜€ ๐—ฏ๐˜† ๐—น๐—ผ๐—ผ๐—ธ๐—ถ๐—ป๐—ด ๐—ฎ๐˜:

โ€ข Chrome/Edge running on servers where they shouldn't be
โ€ข Browser profile directory access by non-browser processes
โ€ข Outbound HTTPS to api.telegram.org from unexpected executables
โ€ข Startup persistence under AppData or ProgramData without operational justification

20.02.2026 01:48 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
TelePeek - Telegram Bot Investigation Professional tool to securely track and analyze bot interactions

I'm using TelePeek.com to monitor the receiving interface (screenshot shows operator's dashboard). The victim profile is concerning with government employees and enterprise users in high-level organizations...

20.02.2026 01:48 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
TelePeek - Telegram Bot Investigation Professional tool to securely track and analyze bot interactions

Exfiltration via Telegram bot API where PhantomStealer packages victim data as JSON and POSTs directly:

โ€ข Browser credentials, cookies, saved passwords
โ€ข System metadata (OS, username, antivirus status)
โ€ข Network reconnaissance (gateway/internal/external IPs)

20.02.2026 01:48 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

Phantom Stealer has been prominent across phishing campaigns over the past two weeks. Operationally interesting to me is that itโ€™s not just an infostealer. It also acts as an initial access broker, dropping GuLoader for follow-on activity, and Iโ€™ve seen it deploy crypto miners as well.

20.02.2026 01:48 ๐Ÿ‘ 5 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Unauthorized npm publish of Cline CLI cline@2.3.0 with modified postinstall script to install openclaw ### Description On February 17, 2026 at 3:26 AM PT, an unauthorized party used a compromised npm publish token to publish an update to Cline CLI on the NPM registry: cline@2.3.0. The published pac...

Worth reading if you're running AI in CI/CD.

github.com/cline/cline/...

18.02.2026 23:01 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Unauthorized npm publish of Cline CLI cline@2.3.0 with modified postinstall script to install openclaw ### Description On February 17, 2026 at 3:26 AM PT, an unauthorized party used a compromised npm publish token to publish an update to Cline CLI on the NPM registry: cline@2.3.0. The published pac...

Clinejection PoC: researcher proved you can compromise a VS Code extension (700k+ weekly users) via prompt injection in GitHub issues.

He was kind enough to install harmless software as a POC. Real attackers won't...

Vendor ignored him for 47 days, fixed it in 30 min after he went public.

18.02.2026 23:01 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
HCSEC-2026-01 - Arbitrary code execution in React server-side rendering of untrusted MDX content Bulletin ID: HCSEC-2026-01 Affected Products / Versions: next-mdx-remote from 4.3.0 up to 5.0.0, fixed in 6.0.0. Publication Date: February 11, 2026 Summary The serialize function used to compileโ€ฆ

Upgrade to 6.0.0 especially if other people can write MDX that your server then compiles and renders for them.

CVE with 8.8 score
- discuss.hashicorp.com/t/hcsec-2026...

13.02.2026 06:26 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
HCSEC-2026-01 - Arbitrary code execution in React server-side rendering of untrusted MDX content Bulletin ID: HCSEC-2026-01 Affected Products / Versions: next-mdx-remote from 4.3.0 up to 5.0.0, fixed in 6.0.0. Publication Date: February 11, 2026 Summary The serialize function used to compileโ€ฆ

MDX content is awesome, I love it, and I use it whenever I can on my projects. But be careful cause if youโ€™re usingย next-mdx-remoteย (4.3.0โ€“5.x) to serverโ€‘side render untrusted MDX, youโ€™re potentially exposing yourself to RCE via CVEโ€‘2026โ€‘0969...

13.02.2026 06:26 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Why Your EDR Needs a Partner: The Case for Application Control How threat intelligence-aware application control fills the gaps that EDR leaves open

...the missing layer.

Full write-up: www.edr-telemetry.com/blog/Why-You...

13.01.2026 20:19 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Why Your EDR Needs a Partner: The Case for Application Control How threat intelligence-aware application control fills the gaps that EDR leaves open

At EDR Telemetry project, we spend a lot of time measuring what EDRs can see. This article is about what they still cannot safely stop.

From LOLBAS to vulnerable drivers to unauthorized RMMs, I walk through the real-world gaps we keep seeing in telemetry and why application control is...

13.01.2026 20:19 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

In the screenshot below, you can see an example of this Skill in use (I'm using GPT 5.2-low in Codex)

Link to the skill: github.com/tsale/awesom...

08.01.2026 18:16 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

We have added a new analysis Skill thanks to @BlueTeamSteve! This skill can be used to quickly and accurately map the MITRE ATT&CK tactic and technique to threat behaviors and indicators you enter in the prompt, saving you a ton of time!

08.01.2026 18:16 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
EDR Comparison - Compare Endpoint Detection & Response Solutions Make informed security decisions with expert EDR comparisons. Compare endpoint detection and response solutions with detailed feature analysis and side-by-side comparisons.

Weโ€™ve also expanded ๐—˜๐—ป๐˜๐—ฒ๐—ฟ๐—ฝ๐—ฟ๐—ถ๐˜€๐—ฒ options for organizations that need additional flexibility, scale, and support on top of the Advanced tier.

Check out the new tiers now: www.edr-comparison.com/pricing

07.01.2026 17:02 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
EDR Comparison - Compare Endpoint Detection & Response Solutions Make informed security decisions with expert EDR comparisons. Compare endpoint detection and response solutions with detailed feature analysis and side-by-side comparisons.

๐—ช๐—ฎ๐˜๐—ฐ๐—ต๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ ๐—˜๐——๐—ฅ. Weโ€™ve also introduced ๐—•๐—ฎ๐˜€๐—ถ๐—ฐ ๐—ฎ๐—ป๐—ฑ ๐—”๐—ฑ๐˜ƒ๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐˜๐—ถ๐—ฒ๐—ฟ๐˜€ to better reflect how different users engage with the platform. With the ๐—”๐—ฑ๐˜ƒ๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐˜๐—ถ๐—ฒ๐—ฟ, weโ€™re introducing a deep dive into the technical justification and expert analysis behind every single feature in our comparison.

07.01.2026 17:02 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Since launching in November, the platform has already helped hundreds of consultants and enterprises navigate the complexity of EDR selection.

This release pushes things forward with a cleaner comparison UX, deeper evaluation context using MITRE ATT&CK evaluation data, and a new vendor added:

07.01.2026 17:02 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
EDR Comparison - Compare Endpoint Detection & Response Solutions Make informed security decisions with expert EDR comparisons. Compare endpoint detection and response solutions with detailed feature analysis and side-by-side comparisons.

๐—˜๐——๐—ฅ ๐—–๐—ผ๐—บ๐—ฝ๐—ฎ๐—ฟ๐—ถ๐˜€๐—ผ๐—ป ๐—ฃ๐—น๐—ฎ๐˜๐—ณ๐—ผ๐—ฟ๐—บ ๐—จ๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ: ๐—ก๐—ฒ๐˜„ ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐—–๐—ผ๐—บ๐—ฝ๐—ฎ๐—ฟ๐—ถ๐˜€๐—ผ๐—ป ๐—˜๐˜…๐—ฝ๐—ฒ๐—ฟ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ, ๐— ๐—œ๐—ง๐—ฅ๐—˜ ๐—”๐—ง๐—ง&๐—–๐—ž ๐—œ๐—ป๐˜€๐—ถ๐—ด๐—ต๐˜๐˜€, ๐—ฎ๐—ป๐—ฑ ๐—ช๐—ฎ๐˜๐—ฐ๐—ต๐—š๐˜‚๐—ฎ๐—ฟ๐—ฑ ๐—˜๐——๐—ฅ

We want to start by thanking everyone who supported us as early adopters.

07.01.2026 17:02 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
GitHub - tsale/awesome-dfir-skills: A curated collection of DFIR skills and workflows for InfoSec practitioners. A curated collection of DFIR skills and workflows for InfoSec practitioners. - tsale/awesome-dfir-skills

Feel free to contribute and use these skills to save a ton of time, like we already do.

github.com/tsale/awesom...

Learn about skills:
- developers.openai.com/codex/skills/
- support.claude.com/en/articles/...

30.12.2025 21:10 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
GitHub - tsale/awesome-dfir-skills: A curated collection of DFIR skills and workflows for InfoSec practitioners. A curated collection of DFIR skills and workflows for InfoSec practitioners. - tsale/awesome-dfir-skills

๐—๐˜‚๐˜€๐˜ ๐—น๐—ฎ๐˜‚๐—ป๐—ฐ๐—ต๐—ฒ๐—ฑ ๐—ฎ๐˜„๐—ฒ๐˜€๐—ผ๐—บ๐—ฒ-๐—ฑ๐—ณ๐—ถ๐—ฟ-๐˜€๐—ธ๐—ถ๐—น๐—น๐˜€ ๐˜„๐—ถ๐˜๐—ต @fr0gger_ !

Designed to save time during investigations and everyday DFIR tasks

Thomas has built an excellent malware triage skill, and Iโ€™ve added a couple of timeline analysis skills to help you get started.

30.12.2025 21:10 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

github.com/tsale/EDR-Te...

This is exactly the kind of vendor collaboration the project aims to promote.
PR with full details and artifacts:

github.com/tsale/EDR-Te...

Big thanks to the C-Prot team for setting a strong example for Linux EDR transparency.

29.12.2025 15:00 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

environment, validated event mappings, and publishedย the raw logs from the evaluation so the community can independently verify everything.

Artifacts included:

โ€ข Real production telemetry logs
โ€ข Some screenshots from the platform

Validation material to reproduce the results can be found under

29.12.2025 15:00 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Add C-Prot telemetry coverage to Linux EDR telemetry matrix by tsale ยท Pull Request #151 ยท tsale/EDR-Telemetry EDR Telemetry Pull Request Contribution Details Adding comprehensive Linux telemetry support for C-Prot EDR, including detailed event mappings, field explanations, and validation artifacts. This co...

Weโ€™ve just added ๐—–-๐—ฃ๐—ฟ๐—ผ๐˜ EDR to the EDR Telemetry Project and it sets a new bar for Linux telemetry!

C-Prot is currently #1 in the Linux EDR table, with exceptional depth and quality of raw telemetry. What really stands out is the level of transparency: we got direct access to a production...

29.12.2025 15:00 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
What are Skills? | Claude Help Center Skills are available as a feature preview for users on Pro, Max, Team, and Enterprise plans. This feature preview requires code execution to be enabled. Skills are also available in beta for Claudeโ€ฆ

Be careful what you install and avoid using skills from unknown or unverified libraries.

Read more about skills here:
- support.claude.com/en/articles/...
- developers.openai.com/codex/skills/

27.12.2025 00:18 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
What are Skills? | Claude Help Center Skills are available as a feature preview for users on Pro, Max, Team, and Enterprise plans. This feature preview requires code execution to be enabled. Skills are also available in beta for Claudeโ€ฆ

One quick caveat tho, as skills libraries become more popular, where you will be able to search and find the right skill you want to install, weโ€™re likely going to see malicious skills pop up that download and execute malware...

27.12.2025 00:18 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Agent Skills Give Codex new capabilities and expertise

Claude set a strong bar for structured, workflow-driven AI usage, and itโ€™s no surprise weโ€™re now seeing similar ideas across other platforms like OpenAI.

Iโ€™ve built DFIR and quick triage workflows that save me hours every time! The time savings really add up, and itโ€™s completely changed how I work.

27.12.2025 00:18 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 1

Pretty ๐Ÿ˜

25.12.2025 21:22 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Merry Christmas everyone! Hope everyoneโ€™s enjoying some downtime ๐ŸŽ„

25.12.2025 19:26 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Much of it remains applicable today, along with the threat hunting series, which Iโ€™m especially proud of.

23.12.2025 17:10 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Cobalt Strike, a Defender's Guide - Part 2 The second part of the Cobalt Strike defender's guide, focusing on network traffic analysis and practical detection methods to identify Cobalt Strike beacons in your environment.

Iโ€™ve moved all of my blog posts from Medium to a new blog section on my personal website.

If youโ€™re looking for a good read, Iโ€™d recommend my Cobalt Strike write-ups (Part 1 & Part 2) from 2021โ€“2022.

kostas.page/blog/cobalt-...

23.12.2025 17:06 ๐Ÿ‘ 5 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image
20.12.2025 16:40 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0