Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Learning Assembly : https://www.youtube.com/playlist?list=PLHJns8WZXCdvESvdr1BRjo4RHiR1Ylhw9 credits @jstrosch (18 video's)
πŸ—£binitamshah


πŸŽ–@malwr
Frebniis : New Malware Abuses Microsoft IIS Feature to Establish Backdoor : https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/frebniis-malware-iis
πŸ—£binitamshah


πŸŽ–@malwr
🐜 CVE-2022-24942 Heap-based buffer overflow in Silicon Labs Gecko SDK (found via automated binary analysisπŸ–₯️)
πŸ—£attilaszia

Skimming the discovery section I saw a mention of a taint tracking module, curious about what other high-level concepts the zero-day analysis tool uses (if it's possible for you to share, I get that you have IP to protect).

Are there any e.g. whitepapers about how the system as a whole works? I'm somewhat knowledgeable about fuzzing and various approaches to that (basic coverage-guided mutation stuff, search-based, grammar-based, etc), curious if that general theory is what the dynamic analysis is based on or if there are other types of dynamic analysis I should go read up on.
πŸ‘€captain_zavec

PRIS looks interesting however I wouldn't be comfortable uploading firmware blobs to the cloud for analysis by PRIS
πŸ‘€WindyDaysAreWindy

Just read your article about log4j incident really cool. Keep the good work!
πŸ‘€waitwatidonteven


πŸŽ–@malwr
How I created a botnet and evaded AV and endpoint detection with one repo
πŸ—£bilbo_begones

Great tool to add too and methods, been thinking of making my own but it's like making a puzzle I'm reverse
πŸ‘€drugged_programmer


πŸŽ–@malwr
Nice reading from 2020 on backdoored counterfeit Cisco equipment.
Credits @FSecure

https://labs.withsecure.com/content/dam/labs/docs/2020-07-the-fake-cisco.pdf

#backdoor #infosec #malware #cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr
File Analysis Suite enable you to quickly and efficiently reduce information risk, analyze, optimize, and secure employee access to critical data. See how in @MicroFocusSec's new #DataProtection white paper: http://ms.spr.ly/60125enQj #DataSecurity #DataPrivacy #CyberResilience
πŸ—£MicroFocus


πŸŽ–@malwr
Finding the right decompiler for Python bytecode can be a pain because there are so many.

I compiled this table to check the supported versions
πŸ—£struppigel


πŸŽ–@malwr
πŸ‘1
If you want to know what its like to be grilled as a forensic expert watch this. From the Murdaugh trial today.
πŸ—£MDCDF

Thanks. I hate it.
πŸ‘€carandfreedomgeek2

Solid one. Another is the kid in Michigan for that shooting. Thanks for posting a link OP!
πŸ‘€bigt252002

When does the expert testimony start?
πŸ‘€FabsudNalteb


πŸŽ–@malwr
New video drop! In this video, we'll explore more #yara basics by looking into #ascii versus #wide char strings. We'll also talk string obfuscation and use the #xor modifier.

https://youtu.be/J9Qr8Vfe9_s
πŸ—£jstrosch


πŸŽ–@malwr
Indirect Prompt Injection on Bing Chat : https://greshake.github.io/

New ways of breaking app-integrated LLMs : https://github.com/greshake/llm-security

Paper : https://arxiv.org/pdf/2302.12173.pdf
πŸ—£binitamshah


πŸŽ–@malwr