- CISO reporting to CTO, how to deal with friction & risk?par /u/Ok_Grapefruit8608 le 16 avril 2026 à 1h04
Throwaway account. I’m a CISO dealing with a classic structural issue; I report directly to the CTO. Because the CTO controls the budget and reporting chain, security consistently takes a backseat to velocity and convenience. We are trying to roll out PAM, but the CTO flat-out refuses to make IT or engineering actually use it. They want to avoid introducing any "friction," so we've only vaulted a fraction of our accounts (mostly our own & external dev contractors). This leaves the rest of the organization with massive credential sprawl and zero oversight. The CTO’s justification revolves entirely around our external developers. Because those developers can rely on automated deployment pipelines with service accounts and don't need to log interactively, the CTO views PAM as unnecessary overhead. But this mindset is being applied across the board—even our internal IT teams, who *do* log in interactively, aren't being forced to have accounts managed. This represents a dangerous misunderstanding of modern identity threats. It’s not just about direct server access. Unmanaged privileged access—whether it's standing IT admin credentials or the highly privileged service accounts running those developer pipelines—is a massive risk. The CTO acts as though only external threats matter, completely ignoring the reality of insider threats and lateral movement. Without PAM controls, if a single IT endpoint or automated pipeline is compromised, an attacker has everything they need to move laterally and escalate privileges. It’s just so frustrating, not being able to have risks understood. Has anyone successfully navigated this IT vs Security dynamic? How do you practically demonstrate the risk to a hard-headed CTO who is stuck in their ways? How do you explain that automation doesn't make security tools for IAM obsolete for developers? How do you get leadership to care about lateral movement instead of just the perimeter? How do you enforce tool adoption due to the overall risk when your boss refuses to make teams use them even indirectly? Appreciate any advice from those who have dealt with similar structural friction. submitted by /u/Ok_Grapefruit8608 [link] [comments]
- New Microsoft SharePoint Zero-Day (CVE, April 15 2026) : Actively Exploited, CISA Deadline Already Set, Here's What You Need to Knowpar /u/MotasemHa le 15 avril 2026 à 20h11
There's a new SharePoint spoofing vulnerability that dropped today and it's already being actively exploited in the wild. Before you scroll past because it's rated 6.5 Medium ; that severity score is exactly why this needs a post. Severity ratings reflect technical complexity, not real-world danger. This one is sitting at the top of the Zero Day Initiative's April disclosure list above vulnerabilities rated 7.5 and 8.4, purely because those aren't actively exploited and this one is. What does it actually do? An unauthenticated attacker can craft a specially formed link targeting SharePoint's /_layouts/ or API rendering endpoints. When that link is clicked by anyone inside your organization, content gets rendered inside SharePoint's UI looking like a completely legitimate internal document. From there the attacker can deploy malicious files, redirect users to phishing pages, fake login prompts, malware-laden documents, or anything else that benefits from appearing to come from a trusted internal source. Confidentiality and integrity are directly impacted. Availability is not because the attacker doesn't get server-level access, so they can't take it down. But they can read sensitive files and modify or plant content. Who's affected? Everyone. SharePoint Server 2016, 2019, Subscription Edition, and SharePoint Online (Microsoft 365). If you're on the online/365 version you're at higher risk because your SharePoint is publicly exposed by design. On-prem deployments are generally lower risk only because they're not internet-facing but hybrid setups absolutely count. Can't patch immediately? Restrict network access to the /_layouts/ and /api/ endpoints at the firewall level. These are the only two paths exploitation attempts will route through, so they're your chokepoint. If you can restrict public access to SharePoint entirely until you patch, do it. I shared more on this release in my video here. submitted by /u/MotasemHa [link] [comments]
- Signed software abused to deploy antivirus-killing scriptspar /u/rkhunter_ le 15 avril 2026 à 20h11
A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. submitted by /u/rkhunter_ [link] [comments]
- CVE-2026-33032: severe nginx-ui bug grants unauthenticated server accesspar Pierluigi Paganini le 15 avril 2026 à 18h59
An actively exploited critical nginx-ui flaw (CVE-2026-33032) lets attackers bypass authentication and take full control of Nginx servers. A critical vulnerability in nginx-ui, tracked as CVE-2026-33032 (CVSS score of 9.8), is being actively exploited, allowing attackers to bypass authentication and fully take over Nginx servers. The issue stems from improper protection of the /mcp_message endpoint, which relies only on IP whitelisting. Since the default whitelist allows all, attackers can access the service without authentication and gain control. “The nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting – and the default IP whitelist is empty, which the middleware treats as “allow all”.” reads the advisory. “This means any network attacker can invoke all MCP tools without authentication, including restarting nginx, creating/modifying/deleting nginx configuration files, and triggering automatic config reloads – achieving complete nginx service takeover.” Yotam Perkal of Pluto Security discovered the nginx-ui flaw. The researcher pointed out that it can be exploited in seconds using just two HTTP requests. “The attack flow: step 1 authenticates to get a session, step 2 uses that session to invoke destructive tools with zero authentication.” wrote Perkal. “An attacker on the same network as the nginx-ui instance needs just two requests: POST /mcp_message?sessionId=xxx – Invoke any tool. No node_secret. No JWT. No cookies. Nothing. GET /mcp?node_secret=xxx – Establish an SSE session, get a sessionId” A single unauthenticated request can let attackers fully compromise nginx-ui. They can intercept all traffic by redirecting it through malicious servers, capture admin credentials via manipulated logs, and gain persistent access by stealing tokens and secrets. Attackers can also map the entire infrastructure by reading configs and even shut down services by pushing invalid configurations. The flaw was fixed in nginx-ui version 2.3.4 by adding a missing authentication check to the /mcp_message endpoint, just one line of code. The update also introduced a regression test to ensure both endpoints require authentication, which would have prevented the issue. Notably, some version trackers are incorrect: v2.3.3 is the last vulnerable release, while v2.3.4 includes the fix. Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, nginx)
- Signed software abused to deploy antivirus-killing scriptspar Bill Toulas le 15 avril 2026 à 18h03
A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. [...]
- Your Supply Chain Breach Is Someone Else's Paydayle 15 avril 2026 à 15h36
TeamPCP exploited a single stolen credential to gain write access to trusted software repositories, inject credential-harvesting malware, and cascade across five ecosystems in five days. Stolen credentials can enable payroll redirection, freight rerouting, and extortion — active campaigns Insikt Group is tracking that show how a software supply chain breach can quickly become a business operations crisis. Learn why an inventory of your software components isn't enough when malicious code is injected after the source commit, and what a truly effective defense — combining third-party due diligence. cryptographic signing, and AI-driven anomaly detection — actually requires. In March 2026, a group calling itself TeamPCP compromised LiteLLM (a Python package with roughly 97 million monthly downloads used by thousands of organizations to connect to AI services) and Checkmarx (one of the most widely used application security testing platforms on the planet). How they got in isn’t publicly confirmed. But the result was write access to a trusted software repository. From there, they injected a credential-harvesting payload into the software and poisoned two Checkmarx GitHub Actions workflows. The malware ran silently on installation, vacuuming up access keys, cloud credentials, secrets, and (the cruelest irony) every AI API key that LiteLLM was specifically designed to manage. The stolen data was encrypted, then pushed to a lookalike domain. And here is the part that should keep you up at night: this was one campaign, by one group, in one week. The downstream consequences are still unfolding. Identity Is the Perimeter (and the Attack Surface) The throughline in the TeamPCP campaign is identity. Start to finish. TeamPCP intelligence summary courtesy of Recorded Future. No one has publicly confirmed exactly how TeamPCP gained access to the LiteLLM maintainer’s repository, but the most likely vector is stolen credentials. Recorded Future’s identity intelligence contains almost 1 million compromised GitHub developer credentials harvested by infostealers and sold across dark web marketplaces. A single publishing token or access key, lifted from a prior infection and left unrotated, would have been sufficient. TeamPCPs’ earlier compromise of Aqua Security’s Trivy infrastructure in late February (where incomplete credential rotation left residual access open for weeks) demonstrates exactly this pattern: one stolen token, one missed rotation, and the door stays open. Whatever the precise mechanism, TeamPCP used valid credentials to push malicious code into trusted repositories. No firewall to bypass. No endpoint to exploit. Just a valid login and the implicit trust that comes with it. Then the payload itself was designed to steal more identities. Each compromised environment yielded credentials that unlocked the next target. Trivy led to GitHub Actions. GitHub Actions led to four additional software distribution ecosystems. One incomplete incident response created a cascading chain of supply chain compromises across five ecosystems in five days. This is the identity and access management problem stated as plainly as possible: if the perimeter is identity, then every stolen credential is a breach in the wall. And unlike a firewall rule, a stolen credential doesn’t trigger an alert. It just works. We previously wrote about how deserialization vulnerabilities have plagued enterprise software for over a decade. The pattern is always the same: trusting input that should not be trusted. Supply chain attacks are the organizational equivalent. We trust the packages we install. We trust the pipelines we build. We trust the security tools we deploy. TeamPCP exploited every layer of that trust, starting with a single compromised identity. The Impact Is Not Just Ransomware TeamPCPs’ Telegram channel references a ransomware victim’s site. The group appears to operate as a ransomware affiliate and has publicly discussed extorting companies by threatening to release over 300 GB of stolen data. Reports indicate a possible collaboration with the Lapsus$ extortion group. Ransomware is the obvious play. CipherForce intelligence summary courtesy of Recorded Future. But ransomware is only the most visible impact. The more dangerous question is: what else can you do with over a million stolen cloud credentials, API keys, and service account tokens? The answer, based on what Insikt Group is tracking across multiple unrelated campaigns, is far broader than encryption and extortion. Redirect payroll. Late last year (2025) Insikt Group was monitoring activity around a campaign called “Swiper,” run by likely Russian-speaking actors who set up phishing infrastructure impersonating major financial institutions and payroll service providers. Stolen credentials were transmitted in real time, enabling the actors to alter direct deposit accounts and redirect payments before anyone noticed. The responsible actor was identified through a dispute on a criminal forum, and their cryptocurrency wallet has processed over 7,000 transactions. This was a credential theft operation that converted identity compromise directly into financial theft. Now imagine that same playbook amplified by a supply chain attack that harvests payroll platform credentials at scale. Reroute shipments. Separately, Insikt Group has identified TAG-160, a threat group targeting the US logistics and transportation sector. TAG-160 impersonates logistics companies, sends fraudulent rate confirmations via phishing emails, and delivers remote access malware. But TAG-160 has also been caught running “double brokering scams,” where they pose as a legitimate carrier, obtain valid load details from a real broker, then re-advertise the load under the broker’s name to contract a different carrier. The legitimate carrier moves the freight. The threat actor collects the payment. The real carrier never gets paid. A second, unrelated threat cluster targets German logistics companies with a similar playbook. These are not theoretical scenarios. They are active campaigns running in parallel with the TeamPCP supply chain compromises. And the common denominator across all of them is credential theft and identity abuse. In the five risk impact categories we use as a framework for translating cyber threats into business risk, the TeamPCP compromise touches every single one: operational disruption (ransomware, system lockout), financial fraud (payroll redirection, double brokering fraud, extortion payments), competitive disadvantage (credentials, trade secrets, PII), brand impairment (customers learning their security tooling was the vector), and legal and compliance consequences (breach notification obligations, potential liability for downstream impacts). The tendency is to categorize supply chain attacks as a “security tool problem” or a “developer problem.” It is neither. It is a business risk problem whose blast radius extends from IT operations to payroll to logistics to the boardroom. Organizations should ask how they can use AI-driven analysis to continuously verify the integrity of every package and build artifact entering their production systems. This means comparing distributed packages against their source repositories to detect injected code. It means analyzing updates to flag anomalous changes in behavior. It means automated provenance verification that traces software from source to distribution, flagging breaks in the chain. But the TeamPCP campaign exposed a truth the industry has been slow to internalize: the security tools themselves are targets. TeamPCP specifically chose a vulnerability scanner and an application security platform because those tools have the broadest access to credentials and infrastructure. Compromising the tool that checks your code is the ultimate fox-in-the-henhouse scenario. The organizations that weather this era of supply chain risk will be those that treat code integrity verification as a continuous, automated, AI-augmented process rather than a periodic audit. So What. Now What. TeamPCP is not done. Their Telegram channel explicitly states the operation is still unfolding, and they claim to be working with new partners to monetize stolen data at scale. For security leaders, the immediate actions are straightforward: if your organization uses LiteLLM, Trivy, or Checkmarx GitHub Actions, assume compromise and rotate every credential on affected systems. Audit your software pipelines for unauthorized changes. Pin software dependencies to verified, immutable versions. But the longer-term lesson is more fundamental. Supply chain attacks convert the trust model of modern software development into an attack surface. The packages you install, the tools you run, the pipelines you build: these are not neutral infrastructure. They are vectors. And the credential stolen today from a compromised software package could show up tomorrow as a payroll redirect, a rerouted shipment, or a ransomware demand. The keys to your kingdom are scattered across every package manager, every automation token, and every service account in your environment. Someone is collecting them. And your supply chain breach is already someone else’s payday. How Recorded Future Helps The TeamPCP campaign left signals at every stage. Three Recorded Future capabilities speak directly to this threat: Identity Intelligence — monitors infostealer logs, dark web markets, and credential dumps in real time, automatically detecting compromised employee credentials and triggering immediate response — including the nearly one million compromised GitHub developer credentials already in Recorded Future's dataset. Insikt Group — elite analysts with deep government, law enforcement, and intelligence agency experience who produced the TeamPCP, Swiper, TAG-160, and CipherForce research in this blog. Customers see threats as they develop, not after they've made headlines. Third-Party Risk — continuously monitors vendors for ransomware extortion activity, breach indicators, and credential leaks, replacing point-in-time questionnaires with real-time visibility across your supply chain.
- Your Supply Chain Breach Is Someone Else's Paydayle 15 avril 2026 à 15h35
TeamPCP exploited a single stolen credential to gain write access to trusted software repositories, inject credential-harvesting malware, and cascade across five ecosystems in five days. Stolen credentials can enable payroll redirection, freight rerouting, and extortion — active campaigns Insikt Group is tracking that show how a software supply chain breach can quickly become a business operations crisis. Learn why an inventory of your software components isn't enough when malicious code is injected after the source commit, and what a truly effective defense — combining third-party due diligence. cryptographic signing, and AI-driven anomaly detection — actually requires. In March 2026, a group calling itself TeamPCP compromised LiteLLM (a Python package with roughly 97 million monthly downloads used by thousands of organizations to connect to AI services) and Checkmarx (one of the most widely used application security testing platforms on the planet). How they got in isn’t publicly confirmed. But the result was write access to a trusted software repository. From there, they injected a credential-harvesting payload into the software and poisoned two Checkmarx GitHub Actions workflows. The malware ran silently on installation, vacuuming up access keys, cloud credentials, secrets, and (the cruelest irony) every AI API key that LiteLLM was specifically designed to manage. The stolen data was encrypted, then pushed to a lookalike domain. And here is the part that should keep you up at night: this was one campaign, by one group, in one week. The downstream consequences are still unfolding. Identity Is the Perimeter (and the Attack Surface) The throughline in the TeamPCP campaign is identity. Start to finish. TeamPCP intelligence summary courtesy of Recorded Future. No one has publicly confirmed exactly how TeamPCP gained access to the LiteLLM maintainer’s repository, but the most likely vector is stolen credentials. Recorded Future’s identity intelligence contains almost 1 million compromised GitHub developer credentials harvested by infostealers and sold across dark web marketplaces. A single publishing token or access key, lifted from a prior infection and left unrotated, would have been sufficient. TeamPCPs’ earlier compromise of Aqua Security’s Trivy infrastructure in late February (where incomplete credential rotation left residual access open for weeks) demonstrates exactly this pattern: one stolen token, one missed rotation, and the door stays open. Whatever the precise mechanism, TeamPCP used valid credentials to push malicious code into trusted repositories. No firewall to bypass. No endpoint to exploit. Just a valid login and the implicit trust that comes with it. Then the payload itself was designed to steal more identities. Each compromised environment yielded credentials that unlocked the next target. Trivy led to GitHub Actions. GitHub Actions led to four additional software distribution ecosystems. One incomplete incident response created a cascading chain of supply chain compromises across five ecosystems in five days. This is the identity and access management problem stated as plainly as possible: if the perimeter is identity, then every stolen credential is a breach in the wall. And unlike a firewall rule, a stolen credential doesn’t trigger an alert. It just works. We previously wrote about how deserialization vulnerabilities have plagued enterprise software for over a decade. The pattern is always the same: trusting input that should not be trusted. Supply chain attacks are the organizational equivalent. We trust the packages we install. We trust the pipelines we build. We trust the security tools we deploy. TeamPCP exploited every layer of that trust, starting with a single compromised identity. The Impact Is Not Just Ransomware TeamPCPs’ Telegram channel references a ransomware victim’s site. The group appears to operate as a ransomware affiliate and has publicly discussed extorting companies by threatening to release over 300 GB of stolen data. Reports indicate a possible collaboration with the Lapsus$ extortion group. Ransomware is the obvious play. CipherForce intelligence summary courtesy of Recorded Future. But ransomware is only the most visible impact. The more dangerous question is: what else can you do with over a million stolen cloud credentials, API keys, and service account tokens? The answer, based on what Insikt Group is tracking across multiple unrelated campaigns, is far broader than encryption and extortion. Redirect payroll. Late last year (2025) Insikt Group was monitoring activity around a campaign called “Swiper,” run by likely Russian-speaking actors who set up phishing infrastructure impersonating major financial institutions and payroll service providers. Stolen credentials were transmitted in real time, enabling the actors to alter direct deposit accounts and redirect payments before anyone noticed. The responsible actor was identified through a dispute on a criminal forum, and their cryptocurrency wallet has processed over 7,000 transactions. This was a credential theft operation that converted identity compromise directly into financial theft. Now imagine that same playbook amplified by a supply chain attack that harvests payroll platform credentials at scale. Reroute shipments. Separately, Insikt Group has identified TAG-160, a threat group targeting the US logistics and transportation sector. TAG-160 impersonates logistics companies, sends fraudulent rate confirmations via phishing emails, and delivers remote access malware. But TAG-160 has also been caught running “double brokering scams,” where they pose as a legitimate carrier, obtain valid load details from a real broker, then re-advertise the load under the broker’s name to contract a different carrier. The legitimate carrier moves the freight. The threat actor collects the payment. The real carrier never gets paid. A second, unrelated threat cluster targets German logistics companies with a similar playbook. These are not theoretical scenarios. They are active campaigns running in parallel with the TeamPCP supply chain compromises. And the common denominator across all of them is credential theft and identity abuse. In the five risk impact categories we use as a framework for translating cyber threats into business risk, the TeamPCP compromise touches every single one: operational disruption (ransomware, system lockout), financial fraud (payroll redirection, double brokering fraud, extortion payments), competitive disadvantage (credentials, trade secrets, PII), brand impairment (customers learning their security tooling was the vector), and legal and compliance consequences (breach notification obligations, potential liability for downstream impacts). The tendency is to categorize supply chain attacks as a “security tool problem” or a “developer problem.” It is neither. It is a business risk problem whose blast radius extends from IT operations to payroll to logistics to the boardroom. Organizations should ask how they can use AI-driven analysis to continuously verify the integrity of every package and build artifact entering their production systems. This means comparing distributed packages against their source repositories to detect injected code. It means analyzing updates to flag anomalous changes in behavior. It means automated provenance verification that traces software from source to distribution, flagging breaks in the chain. But the TeamPCP campaign exposed a truth the industry has been slow to internalize: the security tools themselves are targets. TeamPCP specifically chose a vulnerability scanner and an application security platform because those tools have the broadest access to credentials and infrastructure. Compromising the tool that checks your code is the ultimate fox-in-the-henhouse scenario. The organizations that weather this era of supply chain risk will be those that treat code integrity verification as a continuous, automated, AI-augmented process rather than a periodic audit. So What. Now What. TeamPCP is not done. Their Telegram channel explicitly states the operation is still unfolding, and they claim to be working with new partners to monetize stolen data at scale. For security leaders, the immediate actions are straightforward: if your organization uses LiteLLM, Trivy, or Checkmarx GitHub Actions, assume compromise and rotate every credential on affected systems. Audit your software pipelines for unauthorized changes. Pin software dependencies to verified, immutable versions. But the longer-term lesson is more fundamental. Supply chain attacks convert the trust model of modern software development into an attack surface. The packages you install, the tools you run, the pipelines you build: these are not neutral infrastructure. They are vectors. And the credential stolen today from a compromised software package could show up tomorrow as a payroll redirect, a rerouted shipment, or a ransomware demand. The keys to your kingdom are scattered across every package manager, every automation token, and every service account in your environment. Someone is collecting them. And your supply chain breach is already someone else’s payday. How Recorded Future Helps The TeamPCP campaign left signals at every stage. Three Recorded Future capabilities speak directly to this threat: Identity Intelligence — monitors infostealer logs, dark web markets, and credential dumps in real time, automatically detecting compromised employee credentials and triggering immediate response — including the nearly one million compromised GitHub developer credentials already in Recorded Future's dataset. Insikt Group — elite analysts with deep government, law enforcement, and intelligence agency experience who produced the TeamPCP, Swiper, TAG-160, and CipherForce research in this blog. Customers see threats as they develop, not after they've made headlines. Third-Party Risk — continuously monitors vendors for ransomware extortion activity, breach indicators, and credential leaks, replacing point-in-time questionnaires with real-time visibility across your supply chain.
- How can I properly security-check an AI-built web platform if I’m not a developer?par /u/vinmi le 15 avril 2026 à 15h01
I’ve been building a pretty large web platform mostly with AI assistance, using my own product/logic knowledge to guide the implementation. I’m not a professional programmer, but I do understand how most of the system fits together: frontend, backend, APIs, database structure, auth flows, deployments, and integrations. That was enough to get the project surprisingly far, but now I’m at the stage where security is my biggest concern. The stack is roughly: React + Vite frontend Node.js + Express backend Prisma ORM MySQL/MariaDB Session-based auth, local accounts, and OAuth providers Redis in some environments Nginx + PM2 deployment File/image processing, scheduled jobs, background tasks, and several admin/internal tools The platform has a mix of authenticated app features, admin surfaces, public content endpoints, external integrations, and user-generated data. My main concern is this: since a lot of the code was AI-assisted, how do I properly verify that it’s actually secure? I’m specifically worried about things like: SQL injection or unsafe query patterns auth/session weaknesses privilege escalation / broken role checks insecure API endpoints data extraction or unauthorized access bad file upload handling SSRF, CSRF, XSS, IDOR, and similar issues dependency or server misconfigurations subtle backend mistakes that AI can introduce without being obvious What I’d like from experienced people is practical guidance, such as: What tools would you use first to audit a stack like this? How much can static analysis / automated scanners realistically catch? Can AI be trusted as one layer of review, or should it only be treated as a helper? What are the highest-risk areas in a setup like this? At what point is it worth paying for a real security audit or pentest? I’m not looking for vague “follow best practices” advice. I’d really like a realistic approach for someone who built a serious project without having a formal development or security background. Thanks in advance for the help submitted by /u/vinmi [link] [comments]
- Running Crowdstrike and Defender EDR simultaneously - worth it or redundant?par /u/Successful_Floor_660 le 15 avril 2026 à 13h52
My company is currently running CrowdStrike Falcon (EDR + NGAV) on all ~400 endpoints across Windows and Mac devices. We also have M365 E5 which includes Defender for Endpoint Plan 2. After digging into our environment I found that: • CrowdStrike is active and primary on all devices • Defender AV is in passive mode (CrowdStrike displaced it as primary AV) • Defender EDR is running alongside CrowdStrike with EDR block mode off So effectively we have CrowdStrike as our primary EDR and AV, with Defender EDR passively collecting telemetry in the background. We’re trying to decide between two options: Option A: Reduce CrowdStrike licenses to Mac devices only and let Defender for Endpoint become the primary EDR and AV on Windows. This would save us a lot of cost. Option B: Keep CrowdStrike on everything as primary EDR and AV, keep Defender EDR passive as a secondary layer and fall back. Higher cost but single EDR platform for our SOC and a built-in fallback given the CrowdStrike 2024 outage incident. Key considerations: • We have a third party SOC actively monitoring our environment • We use Rapid7 as our SIEM which would ingest telemetry from both platforms • Mac devices would remain on CrowdStrike regardless • Server and cloud workload EDR is a separate conversation Curious if anyone has run this dual setup intentionally and whether the detection layering and fallback value justifies the cost of maintaining full CrowdStrike coverage on Windows. Or is Option A the obvious move? submitted by /u/Successful_Floor_660 [link] [comments]
- Persistent multi-layer compromise (devices/SIM/identity) — need help isolating root causepar /u/Alexa-007 le 15 avril 2026 à 13h32
I’m trying to analyze what looks like a persistent compromise affecting multiple layers: endpoints, SIM/telecom, and identity-linked systems. Timeline: ~18 months Context: cross-border Observed patterns: Repeated compromise across multiple endpoints (iOS, Android, laptops), even after reset/replacement Multiple SIM replacements (including different registrations) don’t resolve the issue New accounts/credentials get exposed quickly after setup Updated personal data (phone/email/address) seems to propagate unusually fast across services Loss of access to critical services (financial, corporate, admin) Inconsistent availability of official records (e.g., previously filed reports not always retrievable) What I’ve tried: New devices New SIMs (different registrations) Secure email providers Hardware security keys Persistence remains. Working hypotheses (not confirmed): SIM swap / telecom-layer exposure Possible SS7-related vectors Session/token compromise Identity-layer issue (centralized profile / data aggregation) Persistence beyond individual endpoints Constraints: No full forensic capability Multi-system / multi-country complexity Question: If you had to approach this systematically, how would you isolate the root cause? Which layer would you prioritize first? What are the minimal verifiable steps to separate device vs telecom vs identity-level compromise? Any technical direction is appreciated. submitted by /u/Alexa-007 [link] [comments]

Podcast data pour l’investigation
Dernièrement, j’ai eu l’opportunité de réaliser un podcast en compagnie




