all InfoSec news
BianLian GOs for PowerShell After TeamCity Exploitation - The threat actor used winpty-agent.exe on the build servers to remotely run commands from the exploited TeamCity server and leveraged BITSAdmin to deploy additional tools
March 10, 2024, 10:12 a.m. | /u/digicat
For [Blue|Purple] Teams in Cyber Defence www.reddit.com
actor agent bianlian bitsadmin blueteamsec build deploy exploitation exploited powershell run server servers teamcity threat threat actor tools
More from www.reddit.com / For [Blue|Purple] Teams in Cyber Defence
Investigating Microsoft Graph Activity Logs
4 days, 7 hours ago |
www.reddit.com
How an empty S3 bucket can make your AWS bill explode - "As it turns …
4 days, 16 hours ago |
www.reddit.com
Jobs in InfoSec / Cybersecurity
Principal - Cyber Risk and Assurance - Infra/Network
@ GSK | Bengaluru Luxor North Tower
Staff Security Engineer
@ Airwallex | AU - Melbourne
Chief Information Security Officer
@ Australian Payments Plus | Sydney, New South Wales, Australia
TW Test Automation Engineer (Access Control & Intrusion Systems)
@ Bosch Group | Taipei, Taiwan
Consultant infrastructure sécurité H/F
@ Hifield | Sèvres, France
SOC Analyst
@ Wix | Tel Aviv, Israel