Articles by waihtis
62

Sleeper Shells: Attackers Are Planting Dormant Backdoors in Ivanti EPMM (defusedcyber.com)

3

React2Shell Exploitation: A Short Summary of Honeypot Activity (defusedcyber.com)

1

SharePoint Exploit Intelligence with Honeypots (defusedcyber.com)

1

Tracking Ransomware-Exploited Vulnerabilities by Likelihood of Exploitation (defusedcyber.com)

1

Lockbit SQL Dump Visualizer (defusedcyber.com)

1

Satoshi Nakamoto Is Not an Individual (the-void.blog)

2

Deception Plays a Large Role in NIST SP 800-160 (defusedcyber.com)

3

Cyber Deception Has Use Cases You Aren't Thinking Of (defusedcyber.com)

1

A Crypto Turfwar with Cloud Decoys (defusedcyber.com)

1

Mastercard acquires cyber threat intelligence company Recorded Future (mastercard.com)

13

Defcon Response to Badge Issues (twitter.com/defcon)

1

Cyber Deception vs. Honeypots (defusedcyber.com)

1

Misconceptions of AI-Driven Attacks in Infosec (defusedcyber.com)

1

Microsoft GPT Builder is being retired (microsoft.com)

76

Pleasures by Aldous Huxley (1920) (hackneybooks.co.uk)

1

Conference Fabricates Female Speaker Profiles to Inflate Diversity Appearance (twitter.com/gergelyorosz)

2

Lockbit Ransomware Group Claims to Have Ransomed Boeing via Zero-Day (twitter.com/vxunderground)

2

Over 34k Hosts Currently Infected Due to Cisco iOS XE Vulnerability (twitter.com/certcyberdef)

53

Quake related work logs (1996) (gamers.org)

27

‘X’ logo installed atop Twitter building, SF to investigate permit violation (apnews.com)

3

Superconductor Pb10−xCux(PO4)6O showing levitation at room temperature (arxiv.org)