Skip to content

InfoSecStuff

Cyber Security, Threat Intel & Insights

Menu
  • Home
  • About
    • Contact
Menu

Author: InfoSecStuff

10 Windows Commands Every Red Teamer Should Know

Posted on November 12, 2025

This post is going to cover 10 Windows commands for red teamers that are less likely to trigger alerts or look suspicious. Unlike most of the recycled “hacking commands” lists filled with…

SIEM vs. SOAR vs. XDR

Posted on November 10, 2025

Cybersecurity tools have evolved rapidly, and understanding the differences between SIEM vs. SOAR vs. XDR is now critical for IT leaders aiming to strengthen their security postures. Whether you’re a small business…

Ransomware Negotiator Caught Distributing Ransomware: How Insider Knowledge Became a Weapon

Posted on November 6, 2025

It finally happened a trusted ransomware negotiator has been indicted for doing exactly what many in cybersecurity suspected would happen, deploying ransomware themselves. But this isn’t just a betrayal of trust it’s…

SSRF Real Cookie Banner Vulnerability discovery – CVE-2025-12136

Posted on October 26, 2025

During a client engagement we recently identified a Server-Side Request Forgery (SSRF) vulnerability affecting all versions of the Real Cookie Banner WordPress plugin up to and including v5.2.4. The plugin provides cookie…

Storm0501: As Enterprises Move to the Cloud, So Do the Criminals

Posted on September 1, 2025

Microsoft Threat Intelligence has observed a financially motivated cyber-threat actor, tracked as Storm-0501, shifting its playbook to exploit cloud environments. Once a on-premises attacker, the group now prioritizes cloud-native ransomware speeding up…

Managed Security Services Moving to the Cloud: A Cloud-First Future in 2025

Posted on September 1, 2025

The landscape of managed security services (MSS) has undergone a significant transformation in recent years. What was once a premises-based model defined by on-site hardware and localized oversight has rapidly shifted toward…

Affiliate Marketing Scams: How Malicious Actors Exploit Your Program

Posted on August 30, 2025

Affiliate marketing can be a powerful way to grow your business, drive sales, and reward partners for their contributions. But like any open system, it’s also a ripe target for malicious actors….

How Hackers Use Javascript To Distribute Malware

Posted on August 29, 2025

JavaScript is an indispensable part of the modern web, powering everything from dynamic animations to real-time user interfaces. It is widely used in web development, making it a critical technology for building…

Cross Site Request Forgery Examples

Posted on August 29, 2025

Introduction Cross Site Request Forgery (CSRF) is one of the oldest but still most dangerous web application vulnerabilities. It tricks authenticated users into unknowingly performing actions on a web application using their…

The Patching Game: Why Patch Management Is Important and Why It Still Fails Enterprises in 2025

Posted on August 29, 2025

In 2008, the SANS Internet Storm Center made headlines with a sobering discovery: an unpatched Windows XP computer connected to the internet could be compromised in just five minutes. Security researchers showed…

Posts pagination

Previous 1 2 3 Next

Recent Posts

  • A Modern Look at Mobile Device Management: Why MDM Is Now Essential Security Infrastructure
  • NPM Supply Chain Attacks
  • C2 Frameworks That Dominate the Underground
  • Modern EDR Bypass Methods 2025
  • The Difference Between XDR, EDR and MD

Categories

  • Insight (16)
  • Threat Intel (3)
  • vulnerabilities (2)

Latest Posts

  • A Modern Look at Mobile Device Management: Why MDM Is Now Essential Security Infrastructure
  • NPM Supply Chain Attacks
  • C2 Frameworks That Dominate the Underground
©2025 InfoSecStuff | Design: Newspaperly WordPress Theme