Inceptionsec Profile Banner
Inception Security Profile
Inception Security

@Inceptionsec

Followers
894
Following
11
Media
4
Statuses
89

Cybersecurity is about foresight, it is about anticipating the hackers' moves and devising countermeasures to stop them in their tracks.

Secure Location
Joined October 2021
Don't wanna be here? Send us removal request.
@Inceptionsec
Inception Security
3 years
3
18
173
@Inceptionsec
Inception Security
5 days
New blog: How threat actors abuse Microsoft 365 Direct Send to bypass controls and land “internal” phish in inboxes. We cover IOC hunting, connector scoping, RejectDirectSend, and DMARC hardening—plus a free M365 assessment. Read now👇. #M365 #Defender.
Tweet card summary image
inceptionsecurity.com
Phishers are increasingly abusing a little-known Microsoft 365 feature called Direct Send to make malicious emails appear to come from within your company. In July 2025, researchers disclosed a...
0
0
0
@grok
Grok
2 days
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
790
3K
10K
@Inceptionsec
Inception Security
20 days
We have seen this in the wild. #Cybersecurity #ClickFix #OSINT #Phishing #Castleloader.
@TheHackersNews
The Hacker News
20 days
🚨 New malware CastleLoader is hijacking systems through fake GitHub repos and phishing sites—469 confirmed infections. It spreads stealers and RATs, uses PowerShell, and mimics trusted dev tools. It’s stealthy. It’s spreading. Here’s how it works ↓
0
0
0
@Inceptionsec
Inception Security
20 days
BlackSuite and XSS were seized on the same day. Feds have been busy today. #CyberCrime #DarkWeb #LawEnforcement #Cybersecurity #ThreatIntel #Ransomware #CyberOps #FBI #Europol #CyberThreats #BlackSuite #XSS #CyberNews
Tweet media one
Tweet media two
0
0
0
@Inceptionsec
Inception Security
22 days
Zero-day #ToolShell is being actively exploited in the wild, targeting on-prem #SharePoint servers with unauth RCE. ⚠️ CVEs: CVE-2025-53770 (RCE) + CVE-2025-53771 (Auth Bypass).🧠 ToolPane.aspx abused for deserialization & webshells.🔐 Attackers steal MachineKeys, go fileless, &
Tweet media one
0
0
1
@Inceptionsec
Inception Security
22 days
The recent SharePoint vulnerability has been making waves, and I know how overwhelming it can feel when you're not sure how to respond. If your team uses SharePoint, this could impact you. We've all been there—dealing with vulnerabilities feels like a heavy weight on your.
0
0
0
@Inceptionsec
Inception Security
27 days
Got a call last week from someone who was overwhelmed. Their team fell for a fake CAPTCHA phish—something that looked harmless. “Verify you're not a robot.” Within minutes, the attackers were in the mailbox, replying to clients and setting up forwarding rules. The person on the.
0
0
0
@Inceptionsec
Inception Security
28 days
This industry doesn’t need more dashboards and PDFs. It needs human-led collaboration. Boots on the ground. Strategic thinking. Someone who picks up the phone and says, “We’ve got you—let’s fix this together.”. #CyberPartners #TeamworkInSecurity #InfoSec #CyberSupport.
0
0
0
@Inceptionsec
Inception Security
28 days
We jumped in immediately:. Confirmed the threat was real:. - Identified lateral movement attempts.- Helped isolate the affected systems.- Walked their team through cleanup and hardening. That’s what a real MSSP partner does—we don’t just point to the fire, we help put it out.
1
0
0
@Inceptionsec
Inception Security
28 days
They weren’t looking for magic—they just needed someone to actually help. Instead, they got noise and a ticket queue. When threat actors are active in your environment, the last thing you want is a provider who disappears after detection. That’s not security. That’s abandonment.
1
0
0
@Inceptionsec
Inception Security
28 days
A company came to us recently, frustrated, stressed, and in the middle of an active threat. Their MDR provider had flooded them with alerts but refused to help beyond that. No support, no investigation, no remediation help. Just a “not our problem” attitude. Classic punter move.
1
0
0
@Inceptionsec
Inception Security
28 days
🚨 Cyber Victory! Europol's "Operation Eastwood" dismantled pro-Russian hacktivist group NoName057(16), responsible for 1,000+ DDoS attacks on EU/NATO allies supporting Ukraine since 2022. Details: 2 arrests, 100+ servers seized, 1,000+ supporters identified and warned. Global.
0
0
0
@Inceptionsec
Inception Security
28 days
Uncover NightEagle APT's sneaky zero-day hack on Microsoft Exchange, snatching China's AI, quantum, & military intel. Our deep dive reveals tactics, MITRE ATT&CK maps, & how to fight back. Who's ready to level up your defenses? 🔥 #CyberSecurity #APT #NightEagle #ZeroDayExploit.
0
0
1
@Inceptionsec
Inception Security
2 years
🔐 Critical vulnerability #CVE202327997 in #Fortinet FortiOS & FortiProxy SSL-VPN could allow attackers to take control. Ensure you're protected by patching immediately! Read more in our latest blog: Stay #CyberSafe! #InfoSec.
Tweet card summary image
inceptionsecurity.com
The cyber threat landscape is a constantly evolving space where new vulnerabilities are discovered and old ones are patched up. However, the cat-and-mouse game between attackers and defenders often...
0
3
4
@Inceptionsec
Inception Security
2 years
💻🔐 The #RoyalRansomware group poses a real threat to U.S. and international organizations. We've dissected their approach in our latest blog post. Get the insights you need to secure your systems! ➡️ #Cybersecurity #DataEncryption #StaySecure.
Tweet card summary image
inceptionsecurity.com
Since September 2022, cybersecurity threats have taken a new turn with the advent of the Royal ransomware variant. These cybercriminals have successfully infiltrated numerous U.S. and international...
1
2
4
@Inceptionsec
Inception Security
2 years
🔒🛡️ New #BlogPost Alert! 🔒🛡️. Unraveling the mystery of the Bl00dy Gang Ransomware group's exploit of CVE-2023-27350. Discover detection techniques, network traffic signatures, and the MITRE ATT&CK techniques they use. 💻🔍. 🔗 Got hit by a cyberattack?.
Tweet card summary image
inceptionsecurity.com
The vulnerability CVE-2023-27350 enables remote actors to sidestep authentication and execute remote code on several versions of PaperCut installations, including: • Version 8.0.0 up to 19.2.7 •...
0
3
4