Huntress Blog46 · 2026-01-15 15:00
SDFlags | Huntress
While investigating LDAP filters and attributes, I completely missed "SDFlags" in my Event 1644 logs. When I finally noticed it, the investigation led to nTSecurityDescriptor, attack path discovery, and a high-confidence detection signature.
Youssef Sammouda (sam0) personal blog17 · 2026-01-15 22:00
Multiple cross-site leaks disclosing Facebook users in third-party websites
Introduction This write-up consolidates several XS-Leak issues discovered across Meta-owned platforms, including Facebook, Workplace, Meta for Work, and internal Meta surfaces.
Mandiant | Transform Your Cybersecurity15 · 2026-01-15 16:00
From IOC to Action in Minutes: Unlocking Agentic Capabilities in Google Threat Intel
For modern security teams, the gap between detecting a suspicious indicator and fully understanding the threat is often measured in days—time that defenders simply don’t have. Manually correlating data, mapping TTPs, and authoring detection rules creates critical bottlenecks that slow down response and burn out analysts. Join Tim Gallo, Lead Global Solutions Architect, as he demonstrates how to shatter these bottlenecks using the new Agentic capabilities within Google Threat Intelligence. Tim...
ProjectDiscovery.io | Blog8 · 2026-01-15 13:01
Surfacing the real attack surface: Advances in asset discovery
Introduction Accurate external asset discovery remains a moving target for security teams at scale. What’s actually exposed is hard to pin down, regardless of how many inventories or spreadsheets an organization maintains. Release cycles move faster, new domains and endpoints are added constantly, and the attack surface continues to shift, leaving static processes and visibility tools struggling to keep up. Traditional discovery tools are effective at identifying well-known or easily indexed a