New Year, same edge appliances. UNC5221’s camping in vCenter/ESXi + F5 “source-code drama”… and we still price a fresh 0-day at 11%. Your patch queue isn’t a talisman. 🥂🔧 Read the forecast + trade the risk (then subscribe): https://lnkd.in/edmn-6RE #AlphaHunt #CyberSecurity #ZeroDay #VMware
CSIRT Gadgets, LLC
Technology, Information and Internet
Jamestown, New York 154 followers
Helping Security Operators Innovate. Together- We are creating a Trustworthy Internet.
About us
Have a cyber/threat Intel question? Just ask! Helping Counter Intelligence Operators Innovate, Together we are making a Trustworthy Internet. https://alphahunt.io https://blog.alphahunt.io @csirtgadgets https://bsky.app/profile/alphahunt.io
- Website
-
https://csirtgadgets.com
External link for CSIRT Gadgets, LLC
- Industry
- Technology, Information and Internet
- Company size
- 1 employee
- Headquarters
- Jamestown, New York
- Type
- Privately Held
- Founded
- 2015
- Specialties
- Python, Machine Learning, AWS, Innovation, Threat Hunting, Vertex Synapse, AI, Threat Intel, and CTI
Locations
-
Primary
Get directions
Jamestown, New York 14701, US
Updates
-
New Year, same “we forced MFA” cope. 2026 SaaS breaches won’t crack passwords—they’ll stroll in with OAuth tokens + “trusted” apps… while your browser holds the door open 🔑🎆 Read the playbook (then subscribe before the concierge hands out more keys): https://lnkd.in/eARxsPKa #AlphaHunt #CyberSecurity #OAuth #ZeroTrust
-
New year, same SCADA. Feds just charged a Russia-tied hacker for water hits—AlphaHunt pegs a 10% shot of a 500k+ city losing water >48h by ’26. But sure, “manual fallback” will save us 🚰🧯 Read it (then subscribe so you’re not the last one boiling water): https://lnkd.in/e2q3D45Q #AlphaHunt #CyberSecurity #CriticalInfrastructure #ICS
-
SIGNALS FORECAST: Phishing isn’t “back.” It just got a Microsoft-hosted glow-up. 🤖🔑 CoPhish-style lures are grossly effective because the user sees: - a legit-looking Copilot Studio agent/chat link - a familiar OAuth consent moment - and thinks, “Well… it’s Microsoft, so it’s fine.” 🧯 Our Forecast Card is simple: Will we get ≥1 publicly confirmed enterprise breach where a Copilot Studio (or similar chatbot-builder) link tricks a user into granting OAuth access → actual M365 data access by 12/31/2026? (We’re at 56%.) And the real “gotcha”: most breach write-ups won’t print the exact lure domain, so defenders end up arguing vibes instead of evidence. Question for the room: do you still allow end-user OAuth consent in Entra… or did you already shut that door? Read the Forecast Card → https://lnkd.in/eSbAy99X #AlphaHunt #IdentitySecurity #OAuth #Microsoft365 #ThreatHunting #CTI #ThreatIntel
-
-
Happy New Year—your “normal” LLM traffic is now C2. 🎉🤖 If you’re not allowlisting AI egress + rotating API keys fast, you’re basically giving attackers a helpdesk ticket. Read it (then subscribe): https://lnkd.in/eNBWSiZJ #AlphaHunt #CyberSecurity #AI #ThreatIntel
-
SIGNALS WEEKLY: 🔥 Congrats: your database can now “accidentally” donate creds + tokens. MongoBleed (CVE-2025-14847) is in CISA’s KEV — and there are tens of thousands of exposed MongoDB hosts still hanging out on the public internet. 🧯 Also in this week’s Signals: 📱 Android’s January bulletin includes a critical Dolby DD+ fix (patch level 2026-01-05). 🧰 Dev ecosystems stay spicy: n8n workflow code node escape + trojanized VS Code/Open VSX extensions. If you’re a security/eng principal: what’s your KEV patch SLA when it’s “just” an info leak? Read the rundown + detections (and subscribe): https://lnkd.in/emEunVhw #MongoDB #KEV #AndroidSecurity #SupplyChainSecurity #AlphaHunt #CTI #ThreatIntel
-
-
New Year’s resolution: stop letting “helpful” AI agents run C2 on vibes. 🤖🧾 If your connectors aren’t signed + your agent actions aren’t logged, congrats—you built an un-auditable insider threat at scale. Read the forecast (and steal the checklist): https://lnkd.in/eb7MwyCm — then subscribe. #AlphaHunt #CyberSecurity #AIAgents #ZeroTrust
-
New Year’s prediction: Akira has a 20% shot at forcing a 7‑day ambulance diversion across a 10+ hospital system by 2026. Your downtime plan can’t be “vibes.” 🩺🔥 Read the forecast + signals (and subscribe): https://lnkd.in/gWVq8rMP #AlphaHunt #CyberSecurity #Ransomware #Healthcare
-
Years from now we’re going to look back at today’s code and analytics products the way we look at homebrew computers: lovable… and objectively cursed. We’ll still be building—just with fewer duct-tape pipelines, fewer “temporary” dashboards, and fewer 2am regex exorcisms. The future isn’t “no code.” It’s less cruddy code… and way less cruddy products. (And yes: we’ll still ship things we’re mildly embarrassed by. It’s tradition.) #AlphaHunt #ThreatIntel #CTI #AI
-
-
DEEP RESEARCH: Your breach didn’t cost $100M. Your token revoke latency did. 🧯🔑 2025’s costliest U.S. incidents weren’t “mystery zero-days.” They were identity-led intrusions + outage math: • Slow time-to-revoke (users, service principals, OAuth consents) = bigger blast radius • Slow time-to-restore core ops = the real nine-figure multiplier Meanwhile, the “token factory” is getting more efficient: OAuth device code phishing is handing out M365 access tokens like candy—often without stealing passwords or MFA codes. 🙃 So here’s the boring, grown-up playbook that beats heroics: Treat IdP/control planes as tier-0 Build a revocation factory (CAE / universal logout coverage) Drill manual continuity for order-to-cash + clinical ops Honest question: if an attacker gets a token today, how fast can you kill it everywhere? Read / subscribe: https://lnkd.in/epP5zj-Z #AlphaHunt #IdentitySecurity #OAuth #ZeroTrust #CyberSecurity
-