Category: Threat Intelligence

  • What Kerberoasting Is and Why It Still Matters

    Kerberoasting is a credential theft technique that targets service accounts in Microsoft Active Directory environments. The attack allows a domain user to request Kerberos service tickets for accounts associated with Service Principal Names (SPNs) and extract encrypted credential material that can be cracked offline. If the attacker successfully recovers the password for a service account,…

  • Netizen: Monday Security Brief (4/20/2026)

    Today’s Topics: Vercel April 2026 Security Incident Exposes OAuth Risk and Developer Supply Chain Concerns Vercel disclosed a security incident in April 2026 involving unauthorized access to internal systems, tracing the intrusion back to a compromised third-party AI tool and a single employee account that became an entry point into its environment. The attack chain…

  • Microsoft April 2026 Patch Tuesday Fixes 167 Flaws, Including Exploited SharePoint Zero-Day

    Microsoft’s April 2026 Patch Tuesday includes security updates for 167 vulnerabilities, including two zero-days. One of these flaws was actively exploited in the wild, while the other had been publicly disclosed prior to patching. Eight vulnerabilities are classified as critical, seven involving remote code execution and one tied to denial of service. Breakdown of Vulnerabilities…

  • Netizen: Monday Security Brief (4/13/2026)

    Today’s Topics: Cookie-Gated PHP Web Shells and Cron-Based Persistence Are Redefining Stealth on Linux Servers Recent findings from Microsoft Defender Security Research Team point to a quiet but effective evolution in web shell tradecraft, where HTTP cookies are now being used as the primary control channel for PHP-based backdoors operating on Linux servers. This method…

  • Netizen: Monday Security Brief (4/6/2026)

    Today’s Topics: CVE-2025-53521 Reclassified as RCE as Active F5 BIG-IP APM Exploitation Lands in CISA KEV CVE-2025-53521 has moved from a relatively underprioritized denial-of-service issue into something far more operationally significant, now reclassified as a remote code execution vulnerability with a CVSS v4 score of 9.3 and formally added to CISA’s Known Exploited Vulnerabilities catalog…

  • Netizen: Monday Security Brief (3/30/2026)

    Today’s Topics: Compromised IP Cameras Have Become an Intelligence Collection Layer Internet-connected cameras have historically been treated as low-priority security concerns. They were associated with botnet activity, unauthorized viewing, or basic demonstrations of weak authentication controls. That characterization no longer reflects how these devices are being used. Recent conflict activity shows a clear transition from…

  • How to Measure Detection Quality in a Federal SOC

    In a federal Security Operations Center (SOC), detection quality is not defined by alert volume or dashboard metrics. It is defined by how effectively the SOC reduces adversary dwell time, how accurately it distinguishes signal from noise, and how consistently it protects mission systems under regulatory scrutiny. Federal environments introduce architectural and governance complexity: hybrid…

  • Netizen: Monday Security Brief (3/23/2026)

    Today’s Topics: CanisterWorm: A Cloud Worm That Crosses Into Destructive Territory A campaign that started as cloud exploitation has now crossed into something more aggressive, with a financially motivated group deploying a worm that selectively wipes systems tied to Iran. Reporting from KrebsOnSecurity points to a threat actor known as TeamPCP, a group that has…

  • What CMMC 2.0 Monitoring Looks Like Outside of Assessment Windows

    CMMC 2.0 assessments tend to concentrate effort into defined preparation cycles. Evidence is gathered, controls are reviewed, and systems are aligned to demonstrate compliance at a specific point in time. Once that window closes, many organizations shift focus back to daily operations and assume controls will remain intact until the next assessment. That assumption creates…

  • Exchange Online Admin Abuse: What to Watch For

    Exchange Online admin access is high leverage. A single compromised admin account, an over-permissioned role group, or a risky app registration can turn email into an access broker for the rest of the tenant. The goal in most intrusions is not “Exchange takeover” as an end state. The goal is durable collection, silent diversion of…