Austin
banner
aengelic.bsky.social
Austin
@aengelic.bsky.social
Cyber stuff, mostly. Healthcare CTI. Boston Terrier pack member. Former Navy Hospital Corpsman. Generation Kill was about my unit’s experience in Iraq.
Reposted by Austin
New podcast from me -
Destination Cyber
Episode 15: Lesley Carhart kbi.media/podcast/epis...
Episode 15: Lesley Carhart | KBI.Media
kbi.media
November 21, 2025 at 7:35 AM
Reposted by Austin
It’s rare that we see an actual NEW ransomware family, so it will be interesting to see how this develops.

via @lawrenceabrams.bsky.social & @bleepingcomputer.com
Meet ShinySp1d3r: New Ransomware-as-a-Service created by ShinyHunters
An in-development build of the upcoming ShinySp1d3r ransomware-as-a-service platform has surfaced, offering a preview of the upcoming extortion operation.
www.bleepingcomputer.com
November 19, 2025 at 5:20 PM
Reposted by Austin
Adversaries move fast, but their infrastructure patterns betray them. Our new @vertexproject.bsky.social Synapse Rapid Power-Up for Validin, built in-house by @sentinellabs.bsky.social engineers and open-sourced, makes those patterns visible — and operational for analysts. s1.ai/sv-pwrup
Threat Hunting Power Up | Enhance Campaign Discovery With Validin and Synapse
Accelerate adversary tracking and reveal hidden infrastructure with our open-source Synapse Rapid Power-Up for Validin.
s1.ai
November 19, 2025 at 10:15 PM
Reposted by Austin
I totally forgot to post about this huge leak from Chinese government linked infosec company KnownSec (a name that makes me think of 2013 Anonymous more than anything else).
www.techradar.com/pro/data-bre...
Massive leak exposes Chinese cyber capabilities, including its targets
Leaked documents appear to offer a rare look into China’s cyber ecosystem
www.techradar.com
November 16, 2025 at 8:04 PM
Reposted by Austin
Suricata support is coming to DetectionStream.com this upcoming week!

You’ll be able to:
➡️ View and edit all emerging rules
➡️ Test your detections instantly against your PCAPs (everything client-side)
➡️ Create your detections and share them with everyone (AI optional😉)

🔜🔜🔜
DetectionStream - Sigma Detection Rules Platform
Search, analyze, and convert Sigma detection rules with AI-powered creation. Access 3,100+ curated rules with advanced filtering and multi-platform conversion.
DetectionStream.com
November 16, 2025 at 10:58 PM
Reposted by Austin
November 15, 2025 at 5:33 PM
“Increase the power”
November 15, 2025 at 3:49 PM
Reposted by Austin
I’ve been following offensive AI developments with great interest over the last year. I don’t think defenders yet appreciate how rigorously capable Agentic AI will test their attack surface. New blog with Morgan Adamski and David Ames on the topic.

www.pwc.com/us/en/servic...
www.pwc.com
November 15, 2025 at 1:47 AM
November 11, 2025 at 2:51 PM
The ridiculousness of this dog and her ability to be cozy #BostonTerrier
November 9, 2025 at 3:41 PM
Reposted by Austin
Microsoft: SesameOp malware abuses OpenAI Assistants API in attacks
Microsoft: SesameOp malware abuses OpenAI Assistants API in attacks
Microsoft security researchers have discovered a new backdoor malware that uses the OpenAI Assistants API as a covert command-and-control channel.
www.bleepingcomputer.com
November 3, 2025 at 7:09 PM
Reposted by Austin
This is really well written, if you want to scare your CISO, send them this for Halloween. 🎃
🧯The security community is pushing back against new claims that 80% of #ransomware attacks are AI-driven, a figure from a recent MIT-linked report now drawing widespread criticism. →

socket.dev/blog/securit...
Security Community Slams MIT-linked Report Claiming AI Power...
Experts push back on new claims about AI-driven ransomware, warning that hype and sponsored research are distorting how the threat is understood.
socket.dev
October 31, 2025 at 11:32 AM
Reposted by Austin
"sophisticated financial engineering" oh that's not good
October 30, 2025 at 11:52 PM
Halloween
YouTube video by AFI - Topic
youtube.com
October 31, 2025 at 9:55 AM
Reposted by Austin
In mid-2025 Sophos CTU researchers observed a campaign from the BRONZE BUTLER (also known as Tick) theat actor that exploited a zero-day vulnerability (CVE-2025-61932) in Motex LANSCOPE Endpoint Manager to steal confidential information. news.sophos.com/en-us/2025/1...
October 31, 2025 at 9:32 AM
Reposted by Austin
Silent Push threat analysts have uncovered threat actors abusing AdaptixC2 - a free and open-source command-and-control (C2) framework commonly used by penetration testers - to deliver malicious payloads. www.silentpush.com/blog/adaptix...
October 31, 2025 at 9:36 AM
Reposted by Austin
BiDi Swap: The bidirectional text trick that makes fake URLs look real
BiDi Swap: The bidirectional text trick that makes fake URLs look real
Attackers are abusing bidirectional text to make fake URLs look real, reviving a decade-old browser flaw now fueling new phishing tricks. Varonis reveals how the "BiDi Swap" technique works and what organizations need to watch out for.
www.bleepingcomputer.com
October 28, 2025 at 2:23 PM
Reposted by Austin
Hackers Leveraging ClickFix Technique to Deploy NetSupport RAT Loaders
Hackers Leveraging ClickFix Technique to Deploy NetSupport RAT Loaders
cybersecuritynews.com
October 27, 2025 at 10:33 AM
Reposted by Austin
Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
October 27, 2025 at 10:51 AM
Reposted by Austin
We saw Earth Estries, an advanced #APT intrusion set, sharing its access to Earth Naga (Flax Typhoon). We introduce the term "Premier Pass" to describe this behavior, and propose a four-tier classification framework for collaboration types among advanced groups www.trendmicro.com/en_us/resear...
October 22, 2025 at 9:18 AM
Reposted by Austin
I don't want to alarm you, but I’m deeply concerned that two opaque industries are creating giant bubbles on the verge of bursting. Let me explain... https://robertreich.substack.com/p/beware-the-oligarchs-ai-bubble
October 14, 2025 at 3:44 PM
Reposted by Austin
Researchers pointed a satellite dish at the sky for 3 years and monitored what unencrypted data it picked up. The results were shocking: They obtained thousands of T-Mobile users' phone calls and texts, military and law enforcement secrets, much more: www.wired.com/story/satell... 🧵👇
Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
With just $800 in basic equipment, researchers found a stunning variety of data—including thousands of T-Mobile users’ calls and texts and even US military communications—sent by satellites unencrypte...
www.wired.com
October 14, 2025 at 1:03 AM
Reposted by Austin
Trellix ARC reports that XWorm development paused after V5.6 and then returned with V6.0, as seen in a 4 June 2025 post on hackforums. The blog details key plugins, additional payloads, and a script for persistence. www.trellix.com/blogs/resear...
October 6, 2025 at 9:30 AM