Henrik Falk February 12, 2026
Using Advanced Linux Commands in Recon
In this article we will take a practical tour of a small set of classic Unix text tools, such as awk, sed, uniq, sort, and a few shell oneliners. We will show how they fit into a realistic reconnaissance workflow.
hackers-arise.com/linux-using-advanced-linux-commands-in-recon
GAC Hijacking
Threat actors with elevated privileges on the asset could tamper, an assembly inside the GAC folder to execute arbitrary code. The technique could establish persistence by blending into a trusted process.
ipurple.team/2026/02/10/gac-hijacking
On the risk of destructive bricking attacks against OT devices (part 1)
A discussion of the recent cyber attacks against a number of targets connected to Polands electric grid.
www.midnightblue.nl/blog/have-you-tried-turning-it-off-and-on-again-part-1