Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Guide to Enterprise Patch Management Planning
Source: NIST
Download Link:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-40r4.pdf
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
πŸ—£JMonteagudoE


πŸŽ–@malwr
Selena Larson (@selenalarson), Joe Wise (@joewise34) & the Proofpoint Threat Research Team examine major landscape shifts and common tactics, techniques & procedures (TTPs) adopted by a variety of threat actors over the last year. https://www.proofpoint.com/us/blog/threat-insight/crime-finds-way-evolution-and-experimentation-cybercrime-ecosystem
πŸ—£virusbtn


πŸŽ–@malwr
Excited to have several of our engineers @offensive_con this week! Among them will be @yarden_shafir, who gives us an intro to Windows Notification Facility's (WNF) Code Integrity features in our latest blog post.

https://blog.trailofbits.com/2023/05/16/introducing-windows-notification-facilitys-wnf-code-integrity/
πŸ—£trailofbits


πŸŽ–@malwr
Latest Certified Ethical Hacker (CEHv12)
Free resources drive, featuring video lectures, PDF
notes, and practical labs - all at your fingertips!

https://mega.nz/folder/xacxzDxI#wPLPpfdk8m8lCmM-X0BbvQ
πŸ—£khalilApriday


πŸŽ–@malwr
Cisco Talos researchers recently discovered a new ransomware actor called RA Group that has been operating since at least April 22, 2023 using suspected leaked Babuk ransomware source code and targeting companies in the US & South Korea. https://blog.talosintelligence.com/ra-group-ransomware/
πŸ—£virusbtn


πŸŽ–@malwr
Let's start working with the debugger from IDAPython. Easy topics first: process state, debugger modules and debug names. https://youtu.be/rgyTaXkPzfM
πŸ—£allthingsida


πŸŽ–@malwr
New blog post: Cobalt Strike and YARA - Can I have your signature? https://www.cobaltstrike.com/blog/cobalt-strike-and-yara-can-i-have-your-signature/
πŸ—£joehowwolf


πŸŽ–@malwr
Checkpoint researchers have discovered & analysed a malicious firmware implant tailored for TP-Link routers, used in campaigns linked to Chinese APT group Camaro Dragon. The Horse Shell router implant provides remote shell, file transfer & SOCKS tunneling https://research.checkpoint.com/2023/the-dragon-who-sold-his-camaro-analyzing-custom-router-implant/
πŸ—£virusbtn


πŸŽ–@malwr
Secureworks researchers look into the infostealer ecosystem. The evolution of criminal marketplaces allows relatively low-skilled threat actors to access tools with advanced capabilities to attack many victims. https://www.secureworks.com/research/the-growing-threat-from-infostealers
πŸ—£virusbtn


πŸŽ–@malwr
Zscaler's Santiago Vicente & Brett Stone-Gross present a technical analysis of the CryptNet ransomware and look at its close relationship with the Yashma ransomware. https://www.zscaler.com/blogs/security-research/technical-analysis-cryptnet-ransomware
πŸ—£virusbtn


πŸŽ–@malwr
Symantec researchers analyse the Merdoor backdoor, used very selectively by the Lancefly threat group in attacks targeting organizations in South and Southeast Asia. https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lancefly-merdoor-zxshell-custom-backdoor
πŸ—£virusbtn


πŸŽ–@malwr