all InfoSec news
BianLian GOs for PowerShell After TeamCity Exploitation - The threat actor used winpty-agent.exe on the build servers to remotely run commands from the exploited TeamCity server and leveraged BITSAdmin to deploy additional tools
March 10, 2024, 10:12 a.m. | /u/digicat
For [Blue|Purple] Teams in Cyber Defence www.reddit.com
actor agent bianlian bitsadmin blueteamsec build deploy exploitation exploited powershell run server servers teamcity threat threat actor tools
More from www.reddit.com / For [Blue|Purple] Teams in Cyber Defence
How malware authors play with the LNK file format
2 days, 14 hours ago |
www.reddit.com
The Best Way to Start with AWS Security Hub
2 days, 16 hours ago |
www.reddit.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC