home.social

#securityanalysis — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #securityanalysis, aggregated by home.social.

  1. The shadow war between Iran and Israel has escalated to direct strikes on homeland territory. This Clausewitzian analysis examines the strategic shift from proxy warfare, economic impacts on energy markets, and rising risks to regional stability. post.kapualabs.com/yckpf892 #Geopolitics #MiddleEast #SecurityAnalysis

  2. The March 2026 Gulf crisis represents more than regional tensions—it's a structural stress test of our emerging multipolar world order. New analysis reveals how simultaneous Iran-Ukraine pressures expose civilizational fault lines and alliance fractures. Deep dive into the geopolitical implications: post.kapualabs.com/yhbnmvpk

    #Geopolitics #GlobalOrder #SecurityAnalysis #MiddleEast

  3. The March 2026 Gulf crisis represents more than regional tensions—it's a structural stress test of our emerging multipolar world order. New analysis reveals how simultaneous Iran-Ukraine pressures expose civilizational fault lines and alliance fractures. Deep dive into the geopolitical implications: post.kapualabs.com/yhbnmvpk

    #Geopolitics #GlobalOrder #SecurityAnalysis #MiddleEast

  4. The March 2026 Gulf crisis represents more than regional tensions—it's a structural stress test of our emerging multipolar world order. New analysis reveals how simultaneous Iran-Ukraine pressures expose civilizational fault lines and alliance fractures. Deep dive into the geopolitical implications: post.kapualabs.com/yhbnmvpk

    #Geopolitics #GlobalOrder #SecurityAnalysis #MiddleEast

  5. The March 2026 Gulf crisis represents more than regional tensions—it's a structural stress test of our emerging multipolar world order. New analysis reveals how simultaneous Iran-Ukraine pressures expose civilizational fault lines and alliance fractures. Deep dive into the geopolitical implications: post.kapualabs.com/yhbnmvpk

    #Geopolitics #GlobalOrder #SecurityAnalysis #MiddleEast

  6. Beyond military headlines, the Iran conflict reveals civilizational fault lines reshaping global markets. Analysis examines economic warfare through maritime corridors, prediction markets as intelligence gathering, and asymmetric financial vulnerabilities. post.kapualabs.com/2p8mfj4h #Geopolitics #GlobalMarkets #SecurityAnalysis #IranConflict

  7. U.S. security officials now assess that the campaign against Iran is unlikely to overthrow the theocratic regime or permanently eradicate Tehran's nuclear capabilities. #Iran #SecurityAnalysis

  8. Army spokesperson Gintautas Ciunis stated that the most probable origin of the threat is Belarus, given its proximity. #SecurityAnalysis #Geopolitics

  9. An Israeli security official indicates that Iranian ballistic missile launches are expected to continue throughout the ongoing conflict, with no expectation of halting or significantly reducing these attacks. #SecurityAnalysis #MiddleEastConflict

  10. Iran's Supreme National Security Council Secretary Ali Larijani commented on the bounty placed on Iran's leadership. The implications of this statement warrant close scrutiny. #Iran #SecurityAnalysis

  11. BRS-XSS: Новое поколение сканера уязвимостей XSS

    BRS-XSS - это профессиональный инструмент для сканирования уязвимостей Cross-Site Scripting (XSS), разработанный компанией EasyProTech LLC в рамках экосистемы Brabus Recon Suite (BRS). Он создан разработчиком Brabus и впервые опубликован 7 августа 2025 года. Проект ориентирован на специалистов по информационной безопасности, пентестеров и командный редтиминг. Архитектура построена на Python с акцентом на модульность, масштабируемость и практическое применение. Репозиторий: github.com/EPTLLC/brs-xss

    habr.com/ru/articles/934884/

    #python #async #xss #pentest #xssscanner #securityanalysis

  12. YubiKey Side-Channel Attack

    There is a side-channel attack against YubiKey access tokens that allows someone to clone a device. It’s a complicated attack, requiring the victim’s use... schneier.com/blog/archives/202

    #side-channelattacks #securityanalysis #academicpapers #securitytokens #Uncategorized #cloning

  13. 🚨 #KQL Course Update and Anniversary Discount!

    The "Hands-On Kusto Query Language (KQL) for Security Analysts" course has been updated with 5 new exercises focusing on aggregations to answer investigative questions, with more to come! The course now offers:
    ✅ Lots of examples in the lessons
    ✅ A total of 23 exercises
    ✅ 2 Investigation scenarios
    allowing you to enhance your skills in Kusto Query Language.

    Last ~24 hours to get it 30% OFF!

    academy.bluraven.io/hands-on-k

    #KQL
    #SecurityAnalysis
    #Training
    #ThreatHunting
    #IncidentResponse
    #MicrosoftSentinel
    #MicrosoftDefender
    #M365Defender
    #DFIR
    #DataAnalysis

  14. Code Written with AI Assistants Is Less Secure

    Interesting research: “Do Users Write More Insecure Code with AI Assistants?“:
    Abstract: We conduct the first large-scale user study examining how users interact ... schneier.com/blog/archives/202

    #artificialintelligence #securityanalysis #academicpapers #Uncategorized #programming

  15. 🚀 "Hands-On KQL for Security Analysts" Course is Now Live!

    After months of dedicated work, fine-tuning, and anticipation, I am thrilled to invite you to begin your journey in mastering KQL. Whether you're a seasoned security analyst or aspiring to enhance your skills, this course is the gateway to elevating your expertise!

    ✅ Ready to Begin?
    Embark on your learning journey today. Click the link below to enroll and take the first step toward becoming a KQL expert!

    academy.bluraven.io/hands-on-k

    #KQL #SecurityAnalysis #Training #ThreatHunting #IncidentResponse #MicrosoftSentinel #MicrosoftDefender #M365Defender #DFIR #DataAnalysis

  16. 🚀 Exciting News for Security Analysts! 🚀

    I'm thrilled to announce the first-ever "Hands-On Kusto Query Language (KQL) for Security Analysts" training course! 🛡️

    After numerous requests for training content, I've decided to take the plunge and create a comprehensive KQL course tailored specifically for security professionals. It's just about a month away from the launch, and I couldn’t be more thrilled!

    If you want to learn KQL for Microsoft Sentinel or Microsoft 365 Defender, check the details and sign up to get notified at launch! 🥳

    training.bluraven.io/

    #KQL #SecurityAnalysis #Training #ThreatHunting #IncidentResponse #MicrosoftSentinel #MicrosoftDefender #M365Defender #DFIR #DataAnalysis

  17. CW: research review

    M. Albrecht et al., "Four Attacks and a Proof for Telegram"¹

    We study the use of symmetric cryptography in the MTProto 2.0 protocol, Telegram's equivalent of the TLS record protocol. We give positive and negative results. On the one hand, we formally and in detail model a slight variant of Telegram's "record protocol" and prove that it achieves security in a suitable bidirectional secure channel model, albeit under unstudied assumptions; this model itself advances the state-of-the-art for secure channels. On the other hand, we first motivate our modelling deviation from MTProto as deployed by giving two attacks – one of practical, one of theoretical interest – against MTProto without our modifications. We then also give a third attack exploiting timing side channels, of varying strength, in three official Telegram clients. On its own this attack is thwarted by the secrecy of salt and id fields that are established by Telegram's key exchange protocol. We chain the third attack with a fourth one against the implementation of the key exchange protocol on Telegram's servers. This fourth attack breaks the authentication properties of Telegram's key exchange, allowing a MitM attack. More mundanely, it also recovers the id field, reducing the cost of the plaintext recovery attack to guessing the 64-bit salt field. In totality, our results provide the first comprehensive study of MTProto's use of symmetric cryptography, as well as highlight weaknesses in its key exchange.

    #IACR #ResearchPapers #Telegram #MTProto #ProvableSecurity #SecureMessaging #BiDirectionalChannels #SecurityAnalysis

    __
    ¹ eprint.iacr.org/2023/469

  18. Existential Risk and the Fermi Paradox

    We know that complexity is the worst enemy of security, because it makes attack easier and defense harder. This becomes catastrophic as the effects of that attack become greater.
    In <... schneier.com/blog/archives/202

    #securityanalysis #Uncategorized #complexity #risks

  19. I posted part 1 of a 2 part blog series installing #CAPEv2 #sandbox. This first part covers using the official auromated install scripts, working through the encountered errors and verifyimg the web interface is up and running.

    Part 2 will cover Virtual Machine set up and configuration along with config file modifications.
    #malware #malwareanalysis #threatintel #securityanalysis

    cybersheepdog.wordpress.com/20