Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
๐ŸŒ "WebPalm: Unleash Website Secrets for Cybersecurity!" ๐ŸŒ

๐Ÿ”Ž Discover WebPalm : Unleash Website Secrets! ๐ŸŒ
Attention Cybersecurity Enthusiasts! ๐Ÿ›ก๏ธ
Introducing WebPalm, the powerful command-line tool that unlocks the hidden treasures of websites! ๐Ÿ•ต๏ธโ€โ™‚๏ธ Traverse websites, create a complete tree of webpages and links, and explore their interconnectedness like never before.
๐Ÿ” Extract Data with Ease: WebPalm can use regular expressions to extract data from webpage bodies, perfect for web scraping and gathering valuable information.
๐Ÿš€ Fast and Reliable: Enjoy a seamless experience with lightning-fast performance and colorized output for easy error handling.
Join the exploration at:webpalm
Unleash the potential of WebPalm responsibly and dive into the fascinating world of website secrets! ๐ŸŒŸ
๐Ÿ—ฃAdventurous_Dance527


๐ŸŽ–@malwr
๐Ÿ‘1
Within incident response, who are the people who actually analyze/reverse the malware sample?
Unfamiliar with the process, but was looking to learn some new skills soon.
๐Ÿ—ฃHalfQuarter1250

Well anyone with skill, the role doesn't meters and it all depends ofc on complexity. I would say that such specific role is needed only if reversing is done on daily basis... but I would find that hard to believe unless the company is focused on RM. Most of companies, I would assume have analysts that have a strong and weak sides and they do multiple various tasks base on them...It's similar to programmers...some do frontend some to backend programming, some do both - in cyber is just a little more devided by skillet
๐Ÿ‘ค4n6mole

Not to detract from the conversation, but I couldnโ€™t help but notice that nobody has mentioned that in many cases identifying malicious files and code can be performed by several tools specifically designed to analyze payloads and detonate them in a sandboxed environments.

As others have mentioned out side of an AV company or perhaps a larger enterprise/agency, these tools can fill in as โ€œgood enoughโ€ solutions for budget conscious organizations.

Virus Total.
Any.Run
OPSWAT FileScan.
and a handful of other services with analysis and TI built right in.
๐Ÿ‘คMissing_Space_Cadet

Some people hire 3rd party malware analyst. Crowdstrike, red canary, mandiant are some examples of these service providers who will bill you either by the hour or per sample.

Some bigger companies have incident responders who specialize in malware analysis so that the same person responding to the incident is also capable of doing the analysis. Some companies also have an entire team that specializes in malware analysis. This team may also include software engineers who develop internal tools to help conduct and facilitate such analysis.

I've worked as a security engineer for companies that span across all of the above
๐Ÿ‘ค_xpendable_


๐ŸŽ–@malwr
AMD 'Zenbleed' Bug Leaks Data From Zen 2 Ryzen, EPYC CPUs: Most Patches Coming Q4
๐Ÿ—ฃPsyOmega

Netsec used to be ahead of the curve. This is like a 6 or 8 day old vuln now. Fall from grace.
๐Ÿ‘คLumpzor

I wonder if the fixes drop performance like spectre? The article speculates but actual testing numbers will be interesting.
๐Ÿ‘คdemunted


๐ŸŽ–@malwr
๐Ÿ“๐Ÿ“๐Ÿ“Forward posts to the other groups ๐Ÿ“๐Ÿ“๐Ÿ“
Malware News pinned ยซ๐Ÿ“๐Ÿ“๐Ÿ“Forward posts to the other groups ๐Ÿ“๐Ÿ“๐Ÿ“ยป