cyberresearch.bsky.social
@cyberresearch.bsky.social
Originally from BHIS: AI Agents and MCP Security Risks - Vulnerability Highlight | Joff Thyer ( :-{ı▓ #BlackHillsInfoSec #cybersecurity #cyberresearch
AI Agents and MCP Security Risks - Vulnerability Highlight | Joff Thyer
What is MCP, and why does it matter for AI security? 🤔 Agentic AI is changing how LLMs interact with external services, but Anthropic’s Model Context Protocol (MCP) introduces new security challenges you need to know about. Join AI security researcher Joff Thyer from Black Hills InfoSec as he breaks down: ✅ What MCP is ✅ How it connects AI agents to real-world actions ✅ The critical security risks you can’t ignore AI security is the Wild West; Are you ready to be the deputy? #AI #CyberSecurity #MCP #LLM #AIagents Sign up for the next workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks: https://www.antisyphontraining.com/product/workshop-ai-foundation-cyber-security-workflow-optimization-using-ai-technology-with-joff-thyer-and-derek-banks/ /// 🔗 Register for webcasts, summits, and workshops - https://poweredbybhis.com ///Black Hills Infosec Socials Twitter: https://twitter.com/BHinfoSecurity Mastodon: https://infosec.exchange/@blackhillsinfosec LinkedIn: https://www.linkedin.com/company/antisyphon-training Discord: https://discord.gg/ffzdt3WUDe ///Black Hills Infosec Shirts & Hoodies https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections ///Black Hills Infosec Services Active SOC: https://www.blackhillsinfosec.com/services/active-soc/ Penetration Testing: https://www.blackhillsinfosec.com/services/ Incident Response: https://www.blackhillsinfosec.com/services/incident-response/ ///Backdoors & Breaches - Incident Response Card Game Backdoors & Breaches: https://www.backdoorsandbreaches.com/ Play B&B Online: https://play.backdoorsandbreaches.com/ ///Antisyphon Training Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/ Live Training: https://www.antisyphontraining.com/course-catalog/ On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/ Antisyphon Discord: https://discord.gg/antisyphon Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training ///Educational Infosec Content Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/ Wild West Hackin' Fest YouTube: https://www.youtube.com/wildwesthackinfest Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining Active Countermeasures YouTube: https://youtube.com/activecountermeasures Threat Hunter Community Discord: https://discord.gg/threathunter Join us at the annual information security conference in Deadwood, SD (in-person and virtually) — Wild West Hackin' Fest: https://wildwesthackinfest.com/
www.youtube.com
December 17, 2025 at 11:32 AM
Originally from Red Canary: KPop Malware Hunters: 2025’s takedowns ( :-{ı▓ #threatintel #redcanary #cyberresearch
KPop Malware Hunters: 2025’s takedowns
2025 was a golden year for malware takedowns. We asked our friends from the band HUNTR/X to weigh in on some of the biggest hits.
redcanary.com
December 17, 2025 at 11:18 AM
Originally from TrustedSec: Top 10 Blogs of 2025 ( :-{ı▓ #trustedsec #pentesting #cyberresearch
Top 10 Blogs of 2025
Everyone has a year-end list, and this is ours. See what our top-performing cybersecurity blogs were in 2025, there could be some you might have missed!
trustedsec.com
December 16, 2025 at 2:15 PM
Originally from Red Canary: Bun and done: The second coming of the Shai-Hulud worm ( :-{ı▓ #threatintel #redcanary #cyberresearch
Bun and done: The second coming of the Shai-Hulud worm
Everything you need to know about npm compromises from Shai-Hulud’s latest campaign, including detection and prevention guidance
redcanary.com
December 11, 2025 at 11:36 AM
Originally from Unit 42: Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite ( :-{ı▓ #unit42 #threathunting #cyberresearch
Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite
Hamas-affiliated threat actor Ashen Lepus (aka WIRTE) is conducting espionage with its new AshTag malware suite against Middle Eastern government entities. The post Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite appeared first on Unit 42.
unit42.paloaltonetworks.com
December 11, 2025 at 11:36 AM
Originally from DataDog: Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users ( :-{ı▓ #cloudsecurity #datadog #cyberresearch
Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users
In this post, we investigate a recent phishing campaign that targets Microsoft 365 users.
securitylabs.datadoghq.com
December 11, 2025 at 11:35 AM
Originally from Red Canary: Beyond the bomb: When adversaries bring their own virtual machine for persistence ( :-{ı▓ #threatintel #redcanary #cyberresearch
Beyond the bomb: When adversaries bring their own virtual machine for persistence
We peel back the layers on a threat involving an adversary who brought their own VM into an environment following aggressive spam bombing.
redcanary.com
December 10, 2025 at 11:40 AM
Originally from Unit 42: 01flip: Multi-Platform Ransomware Written in Rust ( :-{ı▓ #unit42 #threathunting #cyberresearch
01flip: Multi-Platform Ransomware Written in Rust
01flip is a new ransomware family fully written in Rust. Activity linked to 01flip points to alleged dark web data leaks. The post 01flip: Multi-Platform Ransomware Written in Rust appeared first on Unit 42.
unit42.paloaltonetworks.com
December 10, 2025 at 11:40 AM
Originally from TrustedSec: Holy Shuck! Weaponizing NTLM Hashes as a Wordlist ( :-{ı▓ #trustedsec #pentesting #cyberresearch
Holy Shuck! Weaponizing NTLM Hashes as a Wordlist
Password reuse is common in Active Directory (AD). From an attacker’s perspective, it is a reliable path to lateral movement or privilege escalation. Most IT teams recognize the risk, but longer passwords and password…
trustedsec.com
December 9, 2025 at 2:05 PM
Originally from PortSwigger: The Fragile Lock: Novel Bypasses For SAML Authentication ( :-{ı▓ #PortSwigger #Burpsuite #cyberresearch
The Fragile Lock: Novel Bypasses For SAML Authentication
TLDR This post shows how to achieve a full authentication bypass in the Ruby and PHP SAML ecosystem by exploiting several parser-level inconsistencies: including attribute pollution, namespace confusi
portswigger.net
December 9, 2025 at 11:42 AM