#smb — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #smb, aggregated by home.social.
-
Anthropic launched Claude for Small Business on May 13, targeting 36M U.S. small firms. The 10-city tour reaches 1,000 owners. Real integration points: QuickBooks, PayPal, HubSpot, Docusign. The connectors reveal where adoption likely depends—existing software ecosystems, not just Claude itself.
#AI #SMB #BusinessAutomation https://www.implicator.ai/anthropic-pitches-1-000-main-street-owners-the-real-customer-is-quickbooks-2/
-
Anthropic launched Claude for Small Business on May 13, targeting 36M U.S. small firms. The 10-city tour reaches 1,000 owners. Real integration points: QuickBooks, PayPal, HubSpot, Docusign. The connectors reveal where adoption likely depends—existing software ecosystems, not just Claude itself.
#AI #SMB #BusinessAutomation https://www.implicator.ai/anthropic-pitches-1-000-main-street-owners-the-real-customer-is-quickbooks-2/
-
Anthropic launched Claude for Small Business on May 13, targeting 36M U.S. small firms. The 10-city tour reaches 1,000 owners. Real integration points: QuickBooks, PayPal, HubSpot, Docusign. The connectors reveal where adoption likely depends—existing software ecosystems, not just Claude itself.
#AI #SMB #BusinessAutomation https://www.implicator.ai/anthropic-pitches-1-000-main-street-owners-the-real-customer-is-quickbooks-2/
-
Anthropic launched Claude for Small Business on May 13, targeting 36M U.S. small firms. The 10-city tour reaches 1,000 owners. Real integration points: QuickBooks, PayPal, HubSpot, Docusign. The connectors reveal where adoption likely depends—existing software ecosystems, not just Claude itself.
#AI #SMB #BusinessAutomation https://www.implicator.ai/anthropic-pitches-1-000-main-street-owners-the-real-customer-is-quickbooks-2/
-
Anthropic launched Claude for Small Business on May 13, targeting 36M U.S. small firms. The 10-city tour reaches 1,000 owners. Real integration points: QuickBooks, PayPal, HubSpot, Docusign. The connectors reveal where adoption likely depends—existing software ecosystems, not just Claude itself.
#AI #SMB #BusinessAutomation https://www.implicator.ai/anthropic-pitches-1-000-main-street-owners-the-real-customer-is-quickbooks-2/
-
ICYMI: The ad market is two markets, and most forecasts only see one: Ian Whittaker argues the ad market splits into a visible, agency-led layer and a hidden, fast-growing SMB layer that most industry forecasts consistently miss. https://ppc.land/the-ad-market-is-two-markets-and-most-forecasts-only-see-one/ #Advertising #Marketing #DigitalMarketing #SMB #MarketTrends
-
Windows SMB Flaw Enables File Lockdowns Without Traditional Ransomware Traces
New Windows 'GhostLock' flaw lets attackers lock files on SMB shares. It bypasses security and leaves no traditional ransomware traces. Learn how to respond.
#WindowsSecurity, #CyberAttack, #Ransomware, #SMB, #GhostLock
https://newsletter.tf/windows-ghostlock-flaw-locks-files-no-ransomware/
-
Attackers can now lock files on Windows SMB shares using a new 'GhostLock' method. This exploit is harder to detect than normal ransomware because it doesn't leave typical signs like file changes.
#WindowsSecurity, #CyberAttack, #Ransomware, #SMB, #GhostLock
https://newsletter.tf/windows-ghostlock-flaw-locks-files-no-ransomware/ -
Wondered why my images folder is so huge. Turns out there's a hidden .recycle folder used by Samba/CIFS to act as network level trash bin. You know… in case someone deletes something from a network share by accident.
So all the time I was freeing up space on purpose I ended up with an additional copy on the remote fs 😩
* I use the F-Droid app SMBSync2 to backup my images from the smartphone automatically to my local network share.
-
Analysis of Attack Activities Using SSH+TOR Tunnels to Achieve Covert Persistence
APT-C-13 (Sandworm), also known as FROZENBARENTS, is a state-sponsored advanced persistent threat group conducting global cyber espionage operations. The organization recently deployed malicious campaigns using nested SSH and TOR tunnel infrastructure to establish covert remote access channels. Attackers distribute ZIP archives containing weaponized LNK files via spearphishing emails, which extract and execute payloads that create scheduled tasks disguised as legitimate software. The attack establishes dual-encrypted anonymous tunnels using obfs4 protocol to bypass deep packet inspection, while mapping sensitive ports (SMB/445, RDP/3389) to Onion domains for persistent backdoor access. The campaign leverages sophisticated anti-analysis techniques including sandbox detection, file disguise, and process masquerading to evade detection and maintain long-term unauthorized control over compromised systems for intelligence collection.
Pulse ID: 69f1f50a5410ca637c84368c
Pulse Link: https://otx.alienvault.com/pulse/69f1f50a5410ca637c84368c
Pulse Author: AlienVault
Created: 2026-04-29 12:09:46Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #Email #Espionage #InfoSec #LNK #OTX #Onion #OpenThreatExchange #Phishing #RAT #RDP #SMB #SSH #Sandworm #SpearPhishing #Worm #ZIP #bot #AlienVault
-
Komari Red: The Monitoring Tool with a Built-in Reverse Shell
On April 16, 2026, a threat actor leveraged stolen VPN credentials to access a Windows workstation and deployed a SYSTEM-level backdoor using the Komari agent, an open-source monitoring tool with built-in command-and-control capabilities. The attacker authenticated through an SSLVPN session from IP 45.153.34[.]132 and used Impacket smbexec.py to enable RDP on the target system. The Komari agent was installed as a persistent Windows service named 'Windows Update Service' using NSSM, pulling the installer directly from the official GitHub repository. Komari provides bidirectional control through WebSocket connections, offering arbitrary command execution, interactive reverse shell access, and network probing capabilities by default. Microsoft Defender quarantined an earlier registry dump attempt, forcing the adversary to pivot to this GitHub-based approach. This represents the first publicly documented case of Komari being abused in a real-world intrusion.
Pulse ID: 69f29e7612b827a15dfc7787
Pulse Link: https://otx.alienvault.com/pulse/69f29e7612b827a15dfc7787
Pulse Author: AlienVault
Created: 2026-04-30 00:12:38Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #GitHub #InfoSec #Microsoft #MicrosoftDefender #OTX #OpenThreatExchange #RCE #RDP #SMB #SSL #VPN #Windows #bot #AlienVault
-
Attack Activity Analysis Using SSH+TOR Tunnels for Covert Persistence
APT-C-13 (Sandworm), also known as FROZENBARENTS, is a state-sponsored advanced persistent threat group conducting global cyber espionage targeting government agencies, diplomatic departments, energy enterprises, and research organizations. Recently detected samples reveal the group's use of nested SSH and TOR tunnel architecture to establish covert communication channels. The attack begins with spear-phishing emails delivering malicious LNK files disguised as PDF documents. Upon execution, the payload deploys TOR hidden services mapping internal ports (SMB/445, RDP/3389) to onion domains, while SSH services with public key authentication provide encrypted remote access. The malware employs obfs4 protocol to obfuscate TOR traffic, evading deep packet inspection. Persistence is achieved through scheduled tasks masquerading as legitimate applications like Opera GX and Dropbox, establishing an anonymous shadow management infrastructure for sustained intelligence collection.
Pulse ID: 69f06b1eeeb1fca735cb0bb8
Pulse Link: https://otx.alienvault.com/pulse/69f06b1eeeb1fca735cb0bb8
Pulse Author: AlienVault
Created: 2026-04-28 08:09:02Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #Dropbox #Email #Espionage #Government #InfoSec #LNK #Malware #OTX #Onion #OpenThreatExchange #Opera #PDF #Phishing #RDP #SMB #SSH #Sandworm #SpearPhishing #Worm #bot #AlienVault
-
📰 AI-Driven Attacks Fueling MSP Supply Chain Risk, Guardz Report Finds
🤖 AI-driven attacks are hammering MSPs & SMBs. A new Guardz report finds 9/10 SMBs have compromised users, with attackers abusing RMM tools like ScreenConnect for massive supply chain attacks. #MSP #SMB #CyberSecurity #AI #RMM
-
📰 AI-Driven Attacks Fueling MSP Supply Chain Risk, Guardz Report Finds
🤖 AI-driven attacks are hammering MSPs & SMBs. A new Guardz report finds 9/10 SMBs have compromised users, with attackers abusing RMM tools like ScreenConnect for massive supply chain attacks. #MSP #SMB #CyberSecurity #AI #RMM
-
📰 AI-Driven Attacks Fueling MSP Supply Chain Risk, Guardz Report Finds
🤖 AI-driven attacks are hammering MSPs & SMBs. A new Guardz report finds 9/10 SMBs have compromised users, with attackers abusing RMM tools like ScreenConnect for massive supply chain attacks. #MSP #SMB #CyberSecurity #AI #RMM
-
📰 AI-Driven Attacks Fueling MSP Supply Chain Risk, Guardz Report Finds
🤖 AI-driven attacks are hammering MSPs & SMBs. A new Guardz report finds 9/10 SMBs have compromised users, with attackers abusing RMM tools like ScreenConnect for massive supply chain attacks. #MSP #SMB #CyberSecurity #AI #RMM
-
📰 AI-Driven Attacks Fueling MSP Supply Chain Risk, Guardz Report Finds
🤖 AI-driven attacks are hammering MSPs & SMBs. A new Guardz report finds 9/10 SMBs have compromised users, with attackers abusing RMM tools like ScreenConnect for massive supply chain attacks. #MSP #SMB #CyberSecurity #AI #RMM
-
Most invoicing tools feel like they were built for accountants, not humans. We're changing that.
LoveInvoice is opening a small, invite-only beta — and early users get hands-on support + real influence over the product.
Spots are limited 👇
https://blog.loveinvoice.com/2026/04/loveinvoice-closed-beta-is-now-open/
#productlaunch #launch #saas #invoice #beta #freelancers #smb -
Networking changes coming in macOS 27
https://fed.brid.gy/r/https://eclecticlight.co/2026/04/23/networking-changes-coming-in-macos-27/
-
In the earliest #SMB manuals, they were "Red Mario" and "Green Mario"
Their first names are "Red" and "Green"
Which leads me to believe "Luigi" is a middle name. Red just goes by his last name "Mario" and Green goes by his middle name, "Luigi"
-
Using KATA and KEDR to detect the AdaptixC2 agent
AdaptixC2 is an emerging open-source post-exploitation framework rapidly adopted by threat actors in APT attacks and ransomware campaigns. Written in Go and C++, it supports Windows, macOS, and Linux with extensive modularity through Beacon Object Files (BOFs). The framework enables diverse command-and-control channels including HTTP/S, TCP, mTLS, DNS, DoH, and SMB with RC4 encryption throughout. It implements sophisticated evasion techniques targeting both network detection systems and endpoint defenses. Despite advanced obfuscation capabilities, network-level detection remains viable through analysis of distinctive communication patterns, header structures, and behavioral indicators. The framework supports credential harvesting via LSASS dumping, LAPS exploitation, and Kerberos attacks, alongside defense evasion through process injection and lateral movement via WinRM and PsExec. Combined NDR and EDR solutions provide effective multi-layered detection coverage against AdaptixC2 operations across network ...
Pulse ID: 69e2824daddc65cc4bab207d
Pulse Link: https://otx.alienvault.com/pulse/69e2824daddc65cc4bab207d
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CredentialHarvesting #CyberSecurity #DNS #EDR #Encryption #Endpoint #HTTP #InfoSec #Linux #Mac #MacOS #OTX #OpenThreatExchange #PsExec #RAT #RCE #RansomWare #SMB #TCP #TLS #Windows #bot #AlienVault
-
Using KATA and KEDR to detect the AdaptixC2 agent
AdaptixC2 is an emerging open-source post-exploitation framework rapidly adopted by threat actors in APT attacks and ransomware campaigns. Written in Go and C++, it supports Windows, macOS, and Linux with extensive modularity through Beacon Object Files (BOFs). The framework enables diverse command-and-control channels including HTTP/S, TCP, mTLS, DNS, DoH, and SMB with RC4 encryption throughout. It implements sophisticated evasion techniques targeting both network detection systems and endpoint defenses. Despite advanced obfuscation capabilities, network-level detection remains viable through analysis of distinctive communication patterns, header structures, and behavioral indicators. The framework supports credential harvesting via LSASS dumping, LAPS exploitation, and Kerberos attacks, alongside defense evasion through process injection and lateral movement via WinRM and PsExec. Combined NDR and EDR solutions provide effective multi-layered detection coverage against AdaptixC2 operations across network ...
Pulse ID: 69e2824daddc65cc4bab207d
Pulse Link: https://otx.alienvault.com/pulse/69e2824daddc65cc4bab207d
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CredentialHarvesting #CyberSecurity #DNS #EDR #Encryption #Endpoint #HTTP #InfoSec #Linux #Mac #MacOS #OTX #OpenThreatExchange #PsExec #RAT #RCE #RansomWare #SMB #TCP #TLS #Windows #bot #AlienVault
-
Using KATA and KEDR to detect the AdaptixC2 agent
AdaptixC2 is an emerging open-source post-exploitation framework rapidly adopted by threat actors in APT attacks and ransomware campaigns. Written in Go and C++, it supports Windows, macOS, and Linux with extensive modularity through Beacon Object Files (BOFs). The framework enables diverse command-and-control channels including HTTP/S, TCP, mTLS, DNS, DoH, and SMB with RC4 encryption throughout. It implements sophisticated evasion techniques targeting both network detection systems and endpoint defenses. Despite advanced obfuscation capabilities, network-level detection remains viable through analysis of distinctive communication patterns, header structures, and behavioral indicators. The framework supports credential harvesting via LSASS dumping, LAPS exploitation, and Kerberos attacks, alongside defense evasion through process injection and lateral movement via WinRM and PsExec. Combined NDR and EDR solutions provide effective multi-layered detection coverage against AdaptixC2 operations across network ...
Pulse ID: 69e2824daddc65cc4bab207d
Pulse Link: https://otx.alienvault.com/pulse/69e2824daddc65cc4bab207d
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CredentialHarvesting #CyberSecurity #DNS #EDR #Encryption #Endpoint #HTTP #InfoSec #Linux #Mac #MacOS #OTX #OpenThreatExchange #PsExec #RAT #RCE #RansomWare #SMB #TCP #TLS #Windows #bot #AlienVault
-
Using KATA and KEDR to detect the AdaptixC2 agent
AdaptixC2 is an emerging open-source post-exploitation framework rapidly adopted by threat actors in APT attacks and ransomware campaigns. Written in Go and C++, it supports Windows, macOS, and Linux with extensive modularity through Beacon Object Files (BOFs). The framework enables diverse command-and-control channels including HTTP/S, TCP, mTLS, DNS, DoH, and SMB with RC4 encryption throughout. It implements sophisticated evasion techniques targeting both network detection systems and endpoint defenses. Despite advanced obfuscation capabilities, network-level detection remains viable through analysis of distinctive communication patterns, header structures, and behavioral indicators. The framework supports credential harvesting via LSASS dumping, LAPS exploitation, and Kerberos attacks, alongside defense evasion through process injection and lateral movement via WinRM and PsExec. Combined NDR and EDR solutions provide effective multi-layered detection coverage against AdaptixC2 operations across network ...
Pulse ID: 69e2824daddc65cc4bab207d
Pulse Link: https://otx.alienvault.com/pulse/69e2824daddc65cc4bab207d
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CredentialHarvesting #CyberSecurity #DNS #EDR #Encryption #Endpoint #HTTP #InfoSec #Linux #Mac #MacOS #OTX #OpenThreatExchange #PsExec #RAT #RCE #RansomWare #SMB #TCP #TLS #Windows #bot #AlienVault
-
Using KATA and KEDR to detect the AdaptixC2 agent
AdaptixC2 is an emerging open-source post-exploitation framework rapidly adopted by threat actors in APT attacks and ransomware campaigns. Written in Go and C++, it supports Windows, macOS, and Linux with extensive modularity through Beacon Object Files (BOFs). The framework enables diverse command-and-control channels including HTTP/S, TCP, mTLS, DNS, DoH, and SMB with RC4 encryption throughout. It implements sophisticated evasion techniques targeting both network detection systems and endpoint defenses. Despite advanced obfuscation capabilities, network-level detection remains viable through analysis of distinctive communication patterns, header structures, and behavioral indicators. The framework supports credential harvesting via LSASS dumping, LAPS exploitation, and Kerberos attacks, alongside defense evasion through process injection and lateral movement via WinRM and PsExec. Combined NDR and EDR solutions provide effective multi-layered detection coverage against AdaptixC2 operations across network ...
Pulse ID: 69e2824daddc65cc4bab207d
Pulse Link: https://otx.alienvault.com/pulse/69e2824daddc65cc4bab207d
Pulse Author: AlienVault
Created: 2026-04-17 18:56:13Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CredentialHarvesting #CyberSecurity #DNS #EDR #Encryption #Endpoint #HTTP #InfoSec #Linux #Mac #MacOS #OTX #OpenThreatExchange #PsExec #RAT #RCE #RansomWare #SMB #TCP #TLS #Windows #bot #AlienVault
-
Apple CLI command to mount an SMB share that isn't abysmally slow
-
CLI Command to mount an SMB share on Apple Silicon that isn't abysmally slow
-
FYI: Labor Cost Optimization Strategies That Build Margin Without Cutting Capacity https://integratedstrategicexecutive.com/4s081oy #LaborCostOptimization #SMB #CostReduction #BusinessStrategy #FractionalCOO
-
What is NetBIOS and SMB Exploitation Techniques: A Practical Guide
In this article, I cover key exploitation techniques, real-world attack scenarios, and how to secure these services effectively.
https://denizhalil.com/2026/01/15/netbios-smb-exploitation-techniques-guide/
#CyberSecurity #SMB #NetBIOS #NetworkSecurity #ActiveDirectory #RedTeam #BlueTeam #Pentesting #InfoSec #WindowsSecurity #EthicalHacking #ITSecurity #DenizHalil
-
What is NetBIOS and SMB Exploitation Techniques: A Practical Guide
In this article, I cover key exploitation techniques, real-world attack scenarios, and how to secure these services effectively.
https://denizhalil.com/2026/01/15/netbios-smb-exploitation-techniques-guide/
#CyberSecurity #SMB #NetBIOS #NetworkSecurity #ActiveDirectory #RedTeam #BlueTeam #Pentesting #InfoSec #WindowsSecurity #EthicalHacking #ITSecurity #DenizHalil
-
What is NetBIOS and SMB Exploitation Techniques: A Practical Guide
In this article, I cover key exploitation techniques, real-world attack scenarios, and how to secure these services effectively.
https://denizhalil.com/2026/01/15/netbios-smb-exploitation-techniques-guide/
#CyberSecurity #SMB #NetBIOS #NetworkSecurity #ActiveDirectory #RedTeam #BlueTeam #Pentesting #InfoSec #WindowsSecurity #EthicalHacking #ITSecurity #DenizHalil
-
Es gibt Reaktionen, was ja zu erwarten war 😜 #Supermario #SupermarioBrothers #SMB #speedrunning #speedrun #drama #retrogaming
-
Es gibt Reaktionen, was ja zu erwarten war 😜 #Supermario #SupermarioBrothers #SMB #speedrunning #speedrun #drama #retrogaming
-
Es gibt Reaktionen, was ja zu erwarten war 😜 #Supermario #SupermarioBrothers #SMB #speedrunning #speedrun #drama #retrogaming
-
Es gibt Reaktionen, was ja zu erwarten war 😜 #Supermario #SupermarioBrothers #SMB #speedrunning #speedrun #drama #retrogaming
-
Web-панель для для управления VPN и множеством протоколов v2
Я выпустил вторую версию PHP-веб-панели для управления Amnezia VPN. Теперь это не просто интерфейс к одному серверу, а полноценная система управления VPN-инфраструктурой: 9 протоколов, роли, лимиты, метрики, резервные копии, Docker-управление удаленными хостами и REST API для автоматизации. Проект открыт и доступен на GitHub.
https://habr.com/ru/articles/1020018/
#vpn #vpnсервер #vpnсервис #vpnтуннель #vpnclient #vpnсоединения #администрирование #smb #mtproxy
-
FYI: Criteo opens GO to all: SMBs can now launch AI ad campaigns in 5 clicks: Criteo expands GO platform with full self-service access for SMBs and growth brands, enabling cross-channel AI ad campaigns in as few as five clicks as of March 31, 2026. https://ppc.land/criteo-opens-go-to-all-smbs-can-now-launch-ai-ad-campaigns-in-5-clicks/ #Criteo #AImarketing #AdCampaigns #SMB #DigitalMarketing
-
New by me: The biggest cybersecurity risk for SMBs still isn’t the flashy stuff.
The latest SonicWall Cyber Protect Report really drove that home for me. Good security is usually less about hype and more about execution.
https://www.kylereddoch.me/blog/the-biggest-cybersecurity-risk-for-smbs-still-isnt-the-fancy-stuff/
-
An interesting video about NES Super Mario Bros.: "After 40 Years, Huge NEW Mario Glitch Discovered" by Kosmic:
https://www.youtube.com/watch?v=bNulp6cDqUU
Spoilers below!.
.
It is possible to jump to the end screen in NES Super Mario Bros. using arbitrary code execution (ACE) and without using another game to set up the RAM. However: beating the game with ACE is (a little) slower than without it, and the glitch only works in the Famicom Disk System version.
-
Den lilla kämpar med #SMB på mitt gamla #Nintendo #DS och igår klarade hon äntligen den första världen. Imorse hade hon lite tid över innan förskolan öppnade och då upptäckte vi att hon hade missat att spara spelet. Därför fick hon fortsätta på värld 1. Hon blev uppgiven och jag tyckte synd om henne. Men mellan två koppar kaffe öppnade jag upp hennes spelfil och körde igenom de två sista banorna innan spelvärldens slut... och sparade. #spelpappa #gaming #småbarnsliv
-
RE: https://freeradical.zone/@dabe/114359095686682267
Almost a year later, #ucore has been an amazing base for a home server running #selfhosted containerized apps and #NAS functionality via #SMB. I don't even keep snapshots, just daily #borg backups. Also mergerfs on the off-chance I need a *second* 16TB drive...
-
He aquí un vídeo (con su entrada en el blog) muy instructivo de Lawrence Systems, sobre qué elegir a la hora de instalar servicios #Docker en #LXC o #VM de #Proxmox con su tabla comparativa y todo.
Sigo pensando que la mejor opción para Docker en Proxmox es una #MáquinaVirtual. Tiene también sus desventajas, pero en mi caso, creo que es mejor así. LXC para servicios individuales que además no necesiten #NFS o #SMB.https://www.youtube.com/watch?v=G97LJ_w3fug&feature=youtu.be
-
He aquí un vídeo (con su entrada en el blog) muy instructivo de Lawrence Systems, sobre qué elegir a la hora de instalar servicios #Docker en #LXC o #VM de #Proxmox con su tabla comparativa y todo.
Sigo pensando que la mejor opción para Docker en Proxmox es una #MáquinaVirtual. Tiene también sus desventajas, pero en mi caso, creo que es mejor así. LXC para servicios individuales que además no necesiten #NFS o #SMB.https://www.youtube.com/watch?v=G97LJ_w3fug&feature=youtu.be