Category: Mix
Habits are so good. They even compound! But, they can be hard to start and maintain. I’ve successfully started new…
Threat modeling (with) LLMs, tj-actions woes, reading a threat actor’s Telegram C2 I hope you’ve been doing well! Working on…
A series of vulnerabilities, known as IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974), have been identified in ingress-nginx, a widely used Kubernetes…
The Intigriti team have recently observed an abuse scenario, trending across the industry, where malicious actors are posing as legitimate…
Modern organizations are becoming increasingly reliant on agentic AI, and for good reason: AI agents can dramatically improve efficiency and…
Most organizations are using AI in some way today, whether they know it or not. Some are merely beginning to…
If you are a mature organization, you might manage an external IP block of 65,000 IP addresses (equivalent to a…
We can’t stop learning fundamentals just because tech can do them February 28, 2025 Not learning to code just because…
Large-scale operations and the extensive attack surface of the retail industry render it particularly susceptible to cybercrime, on a global…
Amelia Coen | 13 March 2025 at 08:49 UTC Security is a team sport. Whether you’re a pentester, bug bounty…
Katie Warren | 12 March 2025 at 13:30 UTC Why now? Artificial intelligence is rapidly transforming industries, and security testing…
XML External Entity (XXE) vulnerabilities are one of the most overlooked yet impactful vulnerabilities in modern web applications. Although they’ve…

![[tl;dr sec] #271 – Threat Modeling (+ AI), Backdoored GitHub Actions, Compromising a Threat Actor’s Telegram [tl;dr sec] #271 - Threat Modeling (+ AI), Backdoored GitHub Actions, Compromising a Threat Actor's Telegram](https://image.cybernoz.com/wp-content/uploads/2025/03/1743072871_tldr-sec-271-Threat-Modeling-AI-Backdoored-GitHub.png)









