digital purrr... and Reddit refugee ...
blueteamsec @infosec.pub APT37 Adds New Capabilities for Air-Gapped Networks
blueteamsec @infosec.pub Deep incursions and safe grounds
blueteamsec @infosec.pub Threat Attribution Framework
blueteamsec @infosec.pub FeaturedCTO at NCSC Summary: week ending March 1st
blueteamsec @infosec.pub What’s Running on That Port? Introducing Nerva for Service Fingerprinting
blueteamsec @infosec.pub AI Agent Security Monitoring with Sigma Rules
blueteamsec @infosec.pub IETF: Security Operations Fundamentals and Guidance
blueteamsec @infosec.pub Tracking DPRK operator IPs over time
blueteamsec @infosec.pub ResidentBat: Belarusian KGB Android Spyware at Internet Scale - Censys
blueteamsec @infosec.pub New Dohdoor malware campaign targets education and health care
blueteamsec @infosec.pub Abusing .arpa: The TLD That Isn’t Supposed to Host Anything
blueteamsec @infosec.pub Abusing Cortex XDR Live Terminal as a C2
blueteamsec @infosec.pub OCRFix: Botnet Trojan delivered through ClickFix and EtherHiding
blueteamsec @infosec.pub Blocking Some On-Demand Issuance Caused by Internet Scanning
blueteamsec @infosec.pub Disrupting the GRIDTIDE Global Cyber Espionage Campaign | Google Cloud Blog
blueteamsec @infosec.pub Scattered Lapsus$ Hunters Recruiting Women for Operations
blueteamsec @infosec.pub Diesel Vortex: Inside the Russian cybercrime group targeting US & EU freight
blueteamsec @infosec.pub AutoPiff: Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reachability tracing, and scoring
blueteamsec @infosec.pub Inside the Fix: Analysis of In-the-Wild Exploit of CVE-2026-21513 - correlated it with an observed in-the-wild exploit attributed to the Russian state-sponsored threat actor APT28.
blueteamsec @infosec.pub Chronology of MuddyWater APT Attacks Targeting the Middle East













