おすすめツイート
Here I created a quick map of resources if you're interested in hunting/tracking malware & actors. You learn different techniques employed by researchers in our community. app.mural.co/invitation/mur… If you don't want to signup for Mural, try this link drive.proton.me/urls/9CGXECVWC…
The latest Vulnerability Intelligence Report by Loginsoft reveals crucial trends in ransomware activities for the Year 2023. loginsoft.com/blogs/vulnerab… #ThreatIntelligence #Ransomware #VulnerabilityManagement #RiskManagement #InfoSec #VulnerabilityIntelligence
Researchers uncover Statc Stealer, a dangerous #malware targeting Windows devices. It steals login data, cookies, #cryptocurency wallets, and sensitive information. Find out more in this: thehackernews.com/2023/08/new-st… #cybersecurity #hacking #datasecurity
New findings: QakBot #malware operators set up 15 new command-and-control servers, raising questions about their activities during the 'break' period. Read more: thehackernews.com/2023/08/qakbot… #cybersecurity #technology
thehackernews.com
QakBot Malware Operators Expand C2 Network with 15 New Servers
New findings: QakBot malware operators set up 15 new command-and-control servers, raising questions about their activities during the 'break' period.
🚨 A Russian nation-state actor, Turla, strikes again with the powerful DeliveryCheck backdoor. Learn how it breaches #Microsoft Exchange servers and exfiltrates sensitive messages from Signal app. Read more 👉 thehackernews.com/2023/07/turlas… #cybersecurity
Microsoft has identified highly targeted social engineering attacks by the threat actor Midnight Blizzard (previously NOBELIUM) using credential theft phishing lures sent as Microsoft Teams chats. Get detailed analysis, IOCs, and recommendations: msft.it/60199EEkv
In May, we observed a threat actor (TA) exploit PaperCut NG (CVE-2023-27350) to download/execute a Havoc C2 binary. ➡️The TA then reviewed tasklist before dumping credentials using Mimikatz. ➡️Next, the TA downloaded numerous RMM tools. thedfirreport.com/services/ #AllIntel 1/X
Under investigation: During a hunt for DLL sideloading abuse of vmnat.exe, Sophos X-Ops uncovered a campaign targeting an organization in Southeast Asia. Aligning with TTPs previously attributed to the Mustang Panda threat group, we unraveled a complex, sustained intrusion. 1/10
North Korean state actors linked to the RGB have been identified in the JumpCloud hack! An #OPSEC mistake exposed their IP address. Find details here: thehackernews.com/2023/07/north-… The new report also uncovers the use of malicious Ruby scripts and payloads like FULLHOUSE.DOORED,…
Linux-based vulnerabilities (CVE) exploit detection through runtime security using Falco/Rego #osquery & logs based detection using #sigma github.com/Loginsoft-Rese… #infosec #threathunting #Linux #Exploit
github.com
GitHub - Loginsoft-LLC/Linux-Exploit-Detection: Linux based vulnerabilities (CVE) exploit detection...
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma - Loginsoft-LLC/Linux-Exploit-Detection
AVrecon, a stealthy SOHO router botnet, has silently grown for over 2 years! Over 70,000 routers infected, spanning 20 countries. Find details here: thehackernews.com/2023/07/new-so… #cybersecurity #informationsecurity #hacking
Citrix Gateway VPN compromised via CVE-2023-3519 (a critical unauthenticated RCE) shows evidence of exploitation on 7th July, 11 days before the official patch. The attackers exfiltrated the system configuration file to then probably use the Metasploit module called…
⚠️ Researchers uncover first-ever open-source software supply chain attacks targeting banks! 🏦 #Malware authors posed as employees, tricked users with preinstall scripts, and cleverly used Azure's CDN subdomains. Read details: thehackernews.com/2023/07/bankin… #cybersecurity
New blog post based on a recent intrusion I observed with #Ursnif as the initial infection! Topics include: ✅ Detection opportunities ✅ TAs clipboard data ✅ Post-exploitation and more! The artifacts for this case: buff.ly/3NYx49v The blog: buff.ly/44QCSJ0
Cybercriminals are leveraging exploits for CVE-2021-40444 and CVE-2022-30190 to execute code through malicious Word files. Once opened, LokiBot #malware is downloaded, logging keystrokes, capturing screenshots, and stealing data. Read: thehackernews.com/2023/07/cyberc… #cyberattack
🚨 ALERT: Increased #Truebot malware activity targets U.S. & Canada organizations. 🤝 Joint advisory by @CISAgov, @FBI, @CISecurity's MS-ISAC, & @cybercentre_ca reveals new variants exploiting #Netwrix Auditor vulnerability. 🔗 cisa.gov/news-events/cy… #Cybersecurity
Microsoft Incident Response's investigation of a BlackByte 2.0 ransomware attack that progressed in less than five days highlights the importance of disrupting common attack patterns, stopping attacker activities that precede ransomware deployment: msft.it/6010gxvlQ
Very solid PhD thesis on DNS security: Everything in Its Right Place. Improving DNS resilience ris.utwente.nl/ws/portalfiles… [PDF]
#SmugX campaign targeting European governmental organizations 🇪🇺 : ✉️ Utilizes HTML Smuggling to deliver PlugX payloads 🤖 Abuses RoboForm DLL search order hijacking 🏮 Ties to previously reported RedDelta\ MustangPanda campaigns Read More : research.checkpoint.com/2023/chinese-t…
A Japanese #cryptocurrency exchange fell victim to a recent cyberattack, deploying the stealthy JokerSpy backdoor on Apple #macOS. Find out how this sophisticated toolkit targets macOS machines: thehackernews.com/2023/06/japane… #cybersecurity #hacking
United States トレンド
- 1. #SmackDown 12K posts
- 2. Kevin James 7,702 posts
- 3. Bubba 41.7K posts
- 4. Bill Clinton 141K posts
- 5. End 1Q N/A
- 6. Josh Hart N/A
- 7. Ersson N/A
- 8. Cam Boozer N/A
- 9. #VenezuelaConference 10.4K posts
- 10. End of 1st 1,508 posts
- 11. Dirk 8,694 posts
- 12. #TNATurningPoint 3,006 posts
- 13. Karl Anthony 1,386 posts
- 14. #cthsfb N/A
- 15. Barlow 2,238 posts
- 16. End of the 1st 1,144 posts
- 17. Marlene 5,513 posts
- 18. OG Anunoby N/A
- 19. #BravoCon 6,455 posts
- 20. Metroid 13.7K posts
おすすめツイート
-
Matthew
@embee_research -
Team Cymru Research
@teamcymru_S2 -
Ankit Anubhav
@ankit_anubhav -
Tom Hegel
@TomHegel -
Jake | JCyberSec_
@JCyberSec_ -
The Haag™
@M_haggis -
Andreas Sfakianakis / @[email protected]
@asfakian -
avman
@avman1995 -
Jean
@Jean_Maes_1994 -
Tornado
@0xtornado -
Odisseus
@_odisseus -
MalwareDev
@Malwaredev -
Abtin Assadi
@abtinjon -
B:\a.zza
@mcbazza
Something went wrong.
Something went wrong.