Newsletter 2026-03-31

Posted on Mar 31, 2026

Looks like there was a lot going on last week, which resulted in quite a few links.


TrustedSec has started a blog series around detection. In my view, very much worth reading.


Corelan is back after 7 years without an article and starts with a very comprehensive session around WinDBG and WinDBGX.


Level Blue Security wrote in their blog how the Azure ServiceBus can be used for C2 communication via WebSockets.


Another week, another supply chain attack. Besides the renewed Trivy vulnerability, malicious code was also placed in litellm on PyPi. It’s an infostealer.


And since it’s going so “well” right now, there’s also another attack on open source tools this week.


SearchlightCyber presents a tool that can help with reversing Java and C# programs by directly filtering out known library dependencies.


Interesting phishing approach in which the browser displays a fullscreen windowi, simulating a windows login screen.


In recent weeks there was a very effective attack on the medical device manufacturer Stryker (including defibrillators). The attacker is apparently another Iranian group. Via Intune, 200,000 clients were reset to factory settings. Another good reminder to implement 2FA/MFA and the four-eyes principle in as many places as possible.


Praetorian continues with its emperors and brings Aurelian, a multi-cloud testing tool (AWS (16 modules), Azure (5 modules), and GCP (4 modules)).


There isn’t really much to say about this. The term Watchtowr uses here really hits the nail on the head: “Remote Code Execution as a Service”


Since everyone else loves to bash on Electron, BishopFox took a look at Tauri. XSS to RCE write-up.


An interesting WAF deep dive. Keissy BOD presents a nice structure in the article to systematically work through the WAF, including further links. If you’re dealing with WAFs, worth reading.


Firas Chaib took on the game with probably the most leaked military secrets and added a “test drive” mode.


Read you next time