veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

293
active users

#windowssecurity

0 posts0 participants0 posts today
Cyber Tips Guide<p>Hackers are abusing legitimate but vulnerable Windows drivers to sneak past security tools—a tactic called BYOVD. Make sure your team blocks risky drivers, uses Microsoft’s blocklist, &amp; enables memory integrity. <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsSecurity</span></a> <a href="https://mastodon.social/tags/BYOVD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BYOVD</span></a> <br>🔗 <a href="https://zurl.co/ZdQQN" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">zurl.co/ZdQQN</span><span class="invisible"></span></a></p>
No Starch Press<p>Learn how Windows manages authentication, access control, and resource permissions with clarity and precision. </p><p>This book offers hands-on PowerShell examples that guide you through key internals like the Security Reference Monitor, SAM, and Kerberos—ideal for researchers, defenders, and developers.</p><p><a href="https://nostarch.com/windows-security-internals" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/windows-security-</span><span class="invisible">internals</span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://mastodon.social/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsSecurity</span></a> <a href="https://mastodon.social/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://mastodon.social/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a></p>
Brian Greenberg :verified:<p>🖥️ A new Windows-based Remote Access Trojan (RAT) has been exposed — and it’s unusually stealthy.</p><p>👉 It corrupts critical DOS + PE headers, making it difficult to analyze or reconstruct.<br>👉 It embeds inside dllhost.exe, communicates via encrypted C2, and runs multi-threaded client sessions.<br>👉 Researchers at Fortinet had to replicate the compromised system’s environment to finally analyze it.</p><p>🚨 This attack highlights how adversaries are evolving to evade both detection and reverse engineering.<br>⚠️ Organizations should ensure endpoint monitoring can catch process anomalies — not just file signatures.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> 🛡️ <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> 🔍 <a href="https://infosec.exchange/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsSecurity</span></a> 💻 <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> 🌐<br><a href="https://thehackernews.com/2025/05/new-windows-rat-evades-detection-for.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/05/new-</span><span class="invisible">windows-rat-evades-detection-for.html</span></a></p>