07/31

Censys - Chrome Web Store

https://chromewebstore.google.com/detail/censys/cjcbocemonlaehhhpeaadmgakfofjlll
Censys - Chrome Web Store

BloodHound Query Library

https://queries.specterops.io/
BloodHound Query Library

Entra Connect Attacker Tradecraft: Part 3 - SpecterOps

https://specterops.io/blog/2025/07/30/entra-connect-attacker-tradecraft-part-3/
Entra Connect Attacker Tradecraft: Part 3 - SpecterOps

CrowdStrike Investigates the Threat of Patchless AMSI Bypass Attacks

https://www.crowdstrike.com/en-us/blog/crowdstrike-investigates-threat-of-patchless-amsi-bypass-attacks/
CrowdStrike Investigates the Threat of Patchless AMSI Bypass Attacks

Download the app / X

https://x.com/download
Download the app / X

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

https://thehackernews.com/2025/07/unc2891-breaches-atm-network-via-4g.html
UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

Full Chain Baseband Exploits, Part 1 - taszk.io labs

https://labs.taszk.io/articles/post/full_chain_bb_part1/
Full Chain Baseband Exploits, Part 1 - taszk.io labs

Microsoft to disable Excel workbook links to blocked file types

https://www.bleepingcomputer.com/news/microsoft/microsoft-to-disable-external-workbook-links-to-blocked-file-types/
Microsoft to disable Excel workbook links to blocked file types

Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats | Microsoft Security Blog

https://www.microsoft.com/en-us/security/blog/2025/07/31/frozen-in-transit-secret-blizzards-aitm-campaign-against-diplomats/
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats | Microsoft Security Blog

CISA open-sources Thorium platform for malware, forensic analysis

https://www.bleepingcomputer.com/news/security/cisa-open-sources-thorium-platform-for-malware-forensic-analysis/
CISA open-sources Thorium platform for malware, forensic analysis

Hackers target Python devs in phishing attacks using fake PyPI site

https://www.bleepingcomputer.com/news/security/hackers-target-python-devs-in-phishing-attacks-using-fake-pypi-site/
Hackers target Python devs in phishing attacks using fake PyPI site

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

https://thehackernews.com/2025/07/hackers-exploit-critical-wordpress.html
Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

Microsoft now pays up to $40,000 for some .NET vulnerabilities

https://www.bleepingcomputer.com/news/microsoft/microsoft-now-pays-up-to-40-000-for-some-net-vulnerabilities/
Microsoft now pays up to $40,000 for some .NET vulnerabilities

Spikes in malicious activity precede new security flaws in 80% of cases

https://www.bleepingcomputer.com/news/security/spikes-in-malicious-activity-precede-new-cves-in-80-percent-of-cases/
Spikes in malicious activity precede new security flaws in 80% of cases

Beijing asks Nvidia about backdoors in China-bound AI chips • The Register

https://go.theregister.com/feed/www.theregister.com/2025/07/31/beijing_nvidia_backdoors/
Beijing asks Nvidia about backdoors in China-bound AI chips • The Register

CrushFTP RCE Explained

https://pwn.guide/free/web/crushftp
CrushFTP RCE Explained

Kali Linux can now run in Apple containers on macOS systems

https://www.bleepingcomputer.com/news/security/kali-linux-can-now-run-in-apple-containers-on-macos-systems/
Kali Linux can now run in Apple containers on macOS systems

Proton launches free standalone cross-platform Authenticator app

https://www.bleepingcomputer.com/news/security/proton-launches-free-standalone-cross-platform-authenticator-app/
Proton launches free standalone cross-platform Authenticator app

Microsoft: Russian hackers use ISP access to hack embassies in AiTM attacks

https://www.bleepingcomputer.com/news/security/microsoft-russian-hackers-use-isp-access-to-hack-embassies-in-aitm-attacks/
Microsoft: Russian hackers use ISP access to hack embassies in AiTM attacks

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials

https://thehackernews.com/2025/07/experts-detect-multi-layer-redirect.html
Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials