iknowjason/Awesome-CloudSec-Labs: Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.
🗣jnazario
🎖@malwr
🗣jnazario
🎖@malwr
GitHub
GitHub - iknowjason/Awesome-CloudSec-Labs: Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops…
Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs. - GitHub - iknowjason/Awesome-CloudSec-Labs: Awesome free clou...
AgentTesla - Full Loader Analysis - Resolving API Hashes Using Conditional Breakpoints
🗣jnazario
🎖@malwr
🗣jnazario
🎖@malwr
Embee Research
AgentTesla Malware Analysis - How To Resolve API Hashes With Conditional Breakpoints
Analysis of a Multi-Stage Loader for AgentTesla. Covering Ghidra, Dnspy, X32dbg, API Hashing and more!
McAfee's Anandeshwar Unnikrishnan analyses recent GULoader campaigns in which NSIS-based installers, delivered via email as malspam, use plugin libraries to execute the GU shellcode on the victim system. https://www.mcafee.com/blogs/other-blogs/mcafee-labs/guloader-campaigns-a-deep-dive-analysis-of-a-highly-evasive-shellcode-based-loader/
🗣virusbtn
🎖@malwr
🗣virusbtn
🎖@malwr
Ransomware Risk Management
Download Link (PDF):
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8374.pdf
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
🗣JMonteagudoE
🎖@malwr
Download Link (PDF):
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8374.pdf
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
🗣JMonteagudoE
🎖@malwr
Digital Forensics and Incident Response (DFIR) Framework for OT
Source: NIST
Download Link:
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8428.pdf
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
🗣CyberSecOb
🎖@malwr
Source: NIST
Download Link:
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8428.pdf
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
🗣CyberSecOb
🎖@malwr
We’ve just published another great Plugin Focus article! Can Bölük ( @_can1357 ) introduces his NtRays plugin for automated simplification of Windows Kernel decompilation. Read more 🌐 https://hex-rays.com/blog/plugin-focus-ntrays/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Plugin-Focus-ntrays
#IDAPro #IDAPython #IDAPlugin #NtRays
🗣HexRaysSA
🎖@malwr
#IDAPro #IDAPython #IDAPlugin #NtRays
🗣HexRaysSA
🎖@malwr
Medusa Ransomware technical analysis report
MedusaLocker ransomware has been active since September 2019. MedusaLocker actors typically access victims’ networks by exploiting vulnerabilities in Remote Desktop Protocol (RDP).
https://link.medium.com/G8YxzhstHzb
ℹ️ Sent from one of our channel members
🎖@malwr
MedusaLocker ransomware has been active since September 2019. MedusaLocker actors typically access victims’ networks by exploiting vulnerabilities in Remote Desktop Protocol (RDP).
https://link.medium.com/G8YxzhstHzb
ℹ️ Sent from one of our channel members
🎖@malwr
Medium
Medusa Ransomware technical analysis report
Hello cybermen, I’m about to present a repo about the Medusa locker
👍3
Check out my writeup on #Vidar #Stealer https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-vidar-stealer 😊
@esthreat
🗣AnFam17
🎖@malwr
@esthreat
🗣AnFam17
🎖@malwr
eSentire
eSentire Threat Intelligence Malware Analysis: Vidar Stealer
Dive deeper into the technical details gathered during eSentire’s Threat Response Unit (TRU) team’s research and threat analysis of the Vidar Stealer…
Sophos researchers look into a recently observed ransomware family dubbed Akira and describe how it was deployed by different actors in two incidents they assisted with. https://news.sophos.com/en-us/2023/05/09/akira-ransomware-is-bringin-88-back/
🗣virusbtn
🎖@malwr
🗣virusbtn
🎖@malwr
Deep & Dark web User Profiling @Mont4na - Mont4na users are professional Access Brokers that sell website vulnerabilities and leaked information from various countries including Korea, and mainly sell database access information and web shell privileges
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
Medium
Deep & Dark web User Profiling @Mont4na
Author: HOTSAUCE (위협탐지팀) | S2W TALON
Did you know you can tell IDA to load additional types for Windows API? See how to do that 🌐 https://hex-rays.com/blog/igors-tip-of-the-week-140-loading-pdb-types/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-140
#IgorsTipOfTheWeek #IDAtips #IDAProTutorials
🗣HexRaysSA
🎖@malwr
#IgorsTipOfTheWeek #IDAtips #IDAProTutorials
🗣HexRaysSA
🎖@malwr
Check Point has published its April 2023 Global Threat Index report: AgentTesla was the most prevalent malware last month, with an impact of 10% worldwide organizations, followed by Qbot with a global impact of 7%, and Formbook with a global impact of 6%. https://blog.checkpoint.com/security/april-2023s-most-wanted-malware-qbot-launches-substantial-malspam-campaign-and-mirai-makes-its-return/
🗣virusbtn
🎖@malwr
🗣virusbtn
🎖@malwr
JPCERT/CC has observed attacks on cryptocurrency exchanges believed to be related to the DangerousPassword attack campaign (aka CryptoMimic or SnatchCrypto). They describe the new attack technique used recently by DangerousPassword. https://blogs.jpcert.or.jp/en/2023/05/dangerouspassword.html
🗣virusbtn
🎖@malwr
🗣virusbtn
🎖@malwr
🚀 Just released an updated Windows API function cheatsheet! 📚💻 Level up your skills in #ReverseEngineering #MalwareAnalysis and more with this comprehensive resource. #WindowsAPI #CheatSheet
🔗 Check it out: https://github.com/snowcra5h/windows-api-function-cheatsheets
🗣snowcra5h
🎖@malwr
🔗 Check it out: https://github.com/snowcra5h/windows-api-function-cheatsheets
🗣snowcra5h
🎖@malwr
GitHub
GitHub - 7etsuo/windows-api-function-cheatsheets: A reference of Windows API function calls, including functions for file operations…
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,...
👍2