07/16

Varmint Al's Hunting Page

https://wiby.me/surprise/
Varmint Al's Hunting Page

Analysis of Storm-0558 techniques for unauthorized email access | Microsoft Security Blog

https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/
Analysis of Storm-0558 techniques for unauthorized email access | Microsoft Security Blog

Thousands of images on Docker Hub leak auth secrets, private keys

https://www.bleepingcomputer.com/news/security/thousands-of-images-on-docker-hub-leak-auth-secrets-private-keys/
Thousands of images on Docker Hub leak auth secrets, private keys

JSluice: There's Gold In Them Thar Files by Tomnomnom - YouTube

https://www.youtube.com/watch?v=BnQBp83YbqY
JSluice: There's Gold In Them Thar Files by Tomnomnom - YouTube