Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
How I created a botnet and evaded AV and endpoint detection with one repo
πŸ—£bilbo_begones

Great tool to add too and methods, been thinking of making my own but it's like making a puzzle I'm reverse
πŸ‘€drugged_programmer


πŸŽ–@malwr
Nice reading from 2020 on backdoored counterfeit Cisco equipment.
Credits @FSecure

https://labs.withsecure.com/content/dam/labs/docs/2020-07-the-fake-cisco.pdf

#backdoor #infosec #malware #cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr
File Analysis Suite enable you to quickly and efficiently reduce information risk, analyze, optimize, and secure employee access to critical data. See how in @MicroFocusSec's new #DataProtection white paper: http://ms.spr.ly/60125enQj #DataSecurity #DataPrivacy #CyberResilience
πŸ—£MicroFocus


πŸŽ–@malwr
Finding the right decompiler for Python bytecode can be a pain because there are so many.

I compiled this table to check the supported versions
πŸ—£struppigel


πŸŽ–@malwr
πŸ‘1
If you want to know what its like to be grilled as a forensic expert watch this. From the Murdaugh trial today.
πŸ—£MDCDF

Thanks. I hate it.
πŸ‘€carandfreedomgeek2

Solid one. Another is the kid in Michigan for that shooting. Thanks for posting a link OP!
πŸ‘€bigt252002

When does the expert testimony start?
πŸ‘€FabsudNalteb


πŸŽ–@malwr
New video drop! In this video, we'll explore more #yara basics by looking into #ascii versus #wide char strings. We'll also talk string obfuscation and use the #xor modifier.

https://youtu.be/J9Qr8Vfe9_s
πŸ—£jstrosch


πŸŽ–@malwr
Indirect Prompt Injection on Bing Chat : https://greshake.github.io/

New ways of breaking app-integrated LLMs : https://github.com/greshake/llm-security

Paper : https://arxiv.org/pdf/2302.12173.pdf
πŸ—£binitamshah


πŸŽ–@malwr
Fortinet's James Slaughter writes about the MyDoom worm (also known as Novarg and Mimail) that was first discovered in 2004, but which continues to operate well beyond expectations, with fresh infections still occurring in the wild. https://www.fortinet.com/blog/threat-research/just-because-its-old-doesnt-mean-you-throw-it-away-including-malware
πŸ—£virusbtn


πŸŽ–@malwr
Analysis of BlackLotus UEFI bootkit - Bypasses UEFI Secure Boot even on fully updated Windows 11 systems (It brings legit yet vulnerable binaries to the victim system to exploit CVE-2022-21894 & bypass UEFI Secure Boot) : https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/ credits @smolar_m
πŸ—£binitamshah


πŸŽ–@malwr
Trend Micro's Daniel Lunghi (@thehellu) details the update that Iron Tiger made to the custom malware family SysUpdate in its latest campaign. The custom malware now includes new features and has added malware infection support for the Linux platform. https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html
πŸ—£virusbtn


πŸŽ–@malwr