home.social

#threatactors — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #threatactors, aggregated by home.social.

  1. Phishing Attacks Exploit Amazon SES to Evade Detection

    Kaspersky researchers have uncovered a surge in phishing attacks that cleverly exploit Amazon's trusted email service to evade detection. By using valid Amazon SES credentials, attackers can send convincing phishing messages that slip past standard security checks.

    osintsights.com/phishing-attac

    #PhishingAttacks #AmazonSes #CloudServices #EmailSecurity #ThreatActors

  2. Attackers Exploit Amazon SES to Bypass Email Security in Phishing Campaigns

    Phishing campaigns are now using Amazon's Simple Email Service to make malicious messages look legit, bypassing standard email security checks and putting victims at risk of revealing sensitive data. By exploiting Amazon SES's trusted reputation and authentication features, attackers are making it harder to spot phishing emails.

    osintsights.com/attackers-expl

    #Phishing #AmazonSes #EmailSecurity #CloudServices #ThreatActors

  3. Threat Actors Formalize Operational Security Playbook

    Cybercrime players are now treating operational security as a sophisticated game-changer, and it's time for you to level up your security strategy beyond just using VPNs. A battle-tested three-tier infrastructure model has emerged, separating exposure, execution, and monetization to safeguard high-stakes operations.

    osintsights.com/threat-actors-

    #OperationalSecurity #CardingOperations #ThreatActors #Vpns #Cybercrime

  4. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  5. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  6. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  7. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  8. CALL FOR PAPERS OPEN for Adversary Village at DEF CON 34!
    We are looking for Talks, Workshops, Tool Demos, and Hands-on Activities focused strictly on adversary simulation, threat emulation, offensive tradecraft, threat-informed defense, offensive cyber security, state-sponsored threat actors, purple teaming, and real-world attacker techniques. Vendor-neutral, technical, and practical content only.
    Submit your research here: adversaryvillage.org/call-for-
    CFP Closes on: 31st May 2026
    #DEFCON34 #AdversaryVillage
    #OffensiveCyberSecurity #AdversarySimulation #PurpleTeam #ThreatActors #Breaches #DEFCON

  9. Here is a list of the @gayint updated and modernised APT group identifiers:

    blog.gayint.org/threatActorCro

    I'm just a little disappointed there isn't a MOIST FLANGE or NEON CAPYBARA APT as yet 😉

    #APT #ThreatActors #GAYINT #Nomenclature

  10. Google released a blog post on steps required to take ASAP, so that we are prepared for when quantum computers are readily available to crack current encryption [1]. I read it after I saw a video talking about this post, which as one might expect, was a bit alarmist. However, it is a real #cybersec #threat, and I've seen other sources mention, that #threatactors are starting to gather #encrypted #data in the expectation to readily #decrypt it in the near future. /1

    [1] blog.google/innovation-and-ai/

  11. 🎥 Watch the video recording of the talk: “Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors”, from Adversary Village at @defcon 33 Creator Stage.

    🎤 Speaker: @spark - Staff Threat Researcher at Zscaler.

    youtu.be/j5gxdWd5sMg?si=ET2lcQ

    #AdversaryVillage #DEFCON33 #DEFCON #AccessEverywhere
    #AdversaryTactics #AdversaryEmulation #ThreatActors #AdversarySimulation

  12. 🎥 Watch the video recording of the talk:
    “Here and Now: Exploiting the Human Layer at the Right Moment.” from Adversary Village @defcon 33 Creator Stage.

    🎤 Speaker: Daniel Isler - Awareness & Social Engineering Consultant & Team Leader at Dreamlab Technologies.

    youtu.be/vvDostysRAU?si=E-5LwL

    #AdversaryVillage #DEFCON33 #DEFCON #AccessEverywhere
    #AdversaryTactics #AdversaryEmulation #SocialEngineering
    #ThreatActors #AdversarySimulation #AdversarialMindset