Skip to content

The digital town square for the concert band community.

Connect with local ensembles, trade repertoire insights, and keep the pulse of the wind band world.

  • 0 Votes
    1 Posts
    0 Views
    CTI.FYIC
    New ransom group blog post!Group name: krybitPost title: rhode-hv.deInfo: https://cti.fyi/groups/krybit.html#ransomware #cti #threatintelligence #cybersecurity #infosec
  • 0 Votes
    1 Posts
    0 Views
    CTI.FYIC
    New ransom group blog posts!Group name: incransomPost title: Mag. FΓΌnder Hausverwaltungs GmbHInfo: https://cti.fyi/groups/incransom.htmlGroup name: genesisPost title: ***Info: https://cti.fyi/groups/genesis.htmlGroup name: ransomexxPost title: SOGO AuctionInfo: https://cti.fyi/groups/ransomexx.htmlGroup name: ransomhousePost title: Winnitex (Americas) LimitedInfo: https://cti.fyi/groups/ransomhouse.html#ransomware #cti #threatintelligence #cybersecurity #infosec
  • 0 Votes
    1 Posts
    0 Views
    BSidesLuxembourgB
    Inside the Tech: New Talk Added to BSides Luxembourg π—§π—›π—˜ 𝗙𝗒π—₯π—šπ—’π—§π—§π—˜π—‘ π—™π—œπ—‘π—šπ—˜π—₯𝗣π—₯π—œπ—‘π—§: 𝗗𝗑𝗦 π—•π—”π—¦π—˜π—— π—’π—¦π—œπ—‘π—§ π—§π—˜π—–π—›π—‘π—œπ—€π—¨π—˜π—¦ 𝗙𝗒π—₯ 𝗣π—₯𝗒𝗗𝗨𝗖𝗧 & π—¦π—˜π—₯π—©π—œπ—–π—˜ π——π—œπ—¦π—–π—’π—©π—˜π—₯𝗬 – Rishi ( @rxerium ) Reveal hidden infrastructure in a Talk (40 min) using DNS TXT records to map technologies, dependencies, and external services at scale.DNS is often treated as infrastructure plumbing, but TXT records quietly expose far more than most defenders realize. This session introduces a DNS-based OSINT methodology that leverages large-scale TXT record analysis to uncover embedded service dependencies such as cloud platforms, SaaS integrations, and identity providers.By programmatically scanning DNS zones and integrating the technique into tools like Nuclei and OWASP Amass, this approach enables security teams to build detailed maps of organizational technology stacks and attack surfaces. A real-world case study from the Salesloft breach demonstrates how these signals translate into actionable intelligence for both offensive and defensive use cases.Rishi ( @rxerium ) is a London-based security researcher focused on vulnerability research, threat intelligence, and OSINT-driven attack surface discovery. He contributes to open-source security tooling, supports the UK OSINT community, and focuses on building scalable reconnaissance and detection methodologies. Conference Dates: 6–8 May 2026 | 09:00–18:00 14, Porte de France, Esch-sur-Alzette, Luxembourg️ Tickets: https://2026.bsides.lu/tickets/ Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/ View full schedule & build your agenda: https://hackertracker.app/schedule?conf=BSIDESLUX2026 #BSidesLuxembourg2026 #OSINT #DNS #AttackSurface #ThreatIntelligence #CyberSecurity
  • 0 Votes
    1 Posts
    0 Views
    HackerWorkspaceH
    Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accountshttps://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.htmlRead on HackerWorkspace: https://hackerworkspace.com/article/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts#databreach #cybersecurity #threatintelligence
  • 0 Votes
    1 Posts
    0 Views
    AAA
    New. There's more, but this is getting too long.Zscaler: Payouts King Takes Aim at the Ransomware Throne https://www.zscaler.com/blogs/security-research/payouts-king-takes-aim-ransomware-throne Picus: CVE-2026-21643: Critical SQL Injection in Fortinet FortiClient EMS Exploited in the Wild https://www.picussecurity.com/resource/blog/cve-2026-21643-critical-sql-injection-in-fortinet-forticlient-ems-exploited-in-the-wildMicrosoft: Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/Sohos: QEMU abused to evade detection and enable ransomware delivery https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery @SophosXOps Sekoia: From APT28 to RePythonNET: automating .NET malware analysis https://blog.sekoia.io/apt28-to-repythonnet-automating-net-malware-analysis/ @sekoia_io Proopoint: Beyond the breach: inside a cargo theft actor’s post-compromise playbook https://www.proofpoint.com/us/blog/threat-insight/beyond-breach-inside-cargo-theft-actors-post-compromise-playbook Group-IB: W3LL Unmasked https://www.group-ib.com/blog/w3ll-phishing-ecosystem-takedown/ Posted yesterday:Halcyon: 44% and Rising: What the Automotive Industry's Ransomware Problem Tells Us About Where Attacks Are Heading https://www.halcyon.ai/blog/44-percent-and-rising-automotive-ransomware #infosec #threatresearch #ransomware #threatintel #threatintelligence #Python #Fortinet #SQL #Apple #macOS #Microsoft #cybercrime
  • 0 Votes
    1 Posts
    0 Views
    CTI.FYIC
    New ransom group blog post!Group name: akiraPost title: Truckload Carriers AssociationInfo: https://cti.fyi/groups/akira.html#ransomware #cti #threatintelligence #cybersecurity #infosec
  • 0 Votes
    1 Posts
    0 Views
    CTI.FYIC
    New ransom group blog post!Group name: akiraPost title: CIR RealtyInfo: https://cti.fyi/groups/akira.html#ransomware #cti #threatintelligence #cybersecurity #infosec