Malware News pinned Β«Guys with premium telegram account, boost please: https://t.me/malwr?boostΒ»
How to Get a Reverse Shell on macOS Using A Flipper Zero as a BadUSB
π£cybersourcenews
You plug it in.
π€One_Doubt_75
π@malwr
π£cybersourcenews
You plug it in.
π€One_Doubt_75
π@malwr
Affordable SIEM labs/learning
Besides setting up a home lab to learn SIEM tools, are there pre-made SIEM labs one can purchase? More importantly, any Splunk training available that are not from Spunk? Which SIEM tools should one focus on? Apologies if this was similarly asked.
π£greytrain09
Elasticsearch has a nice huge swath of FREE to use
π€sirrush7
Immersive labs have splunk and elastic
Blue team level 1 uses splunk
Titan labs do ArcSight
π€Reverse_Quikeh
π@malwr
Besides setting up a home lab to learn SIEM tools, are there pre-made SIEM labs one can purchase? More importantly, any Splunk training available that are not from Spunk? Which SIEM tools should one focus on? Apologies if this was similarly asked.
π£greytrain09
Elasticsearch has a nice huge swath of FREE to use
π€sirrush7
Immersive labs have splunk and elastic
Blue team level 1 uses splunk
Titan labs do ArcSight
π€Reverse_Quikeh
π@malwr
Reddit
From the cybersecurity community on Reddit
Explore this post and more from the cybersecurity community
Malware News pinned Β«Guys with premium telegram account, boost please: https://t.me/malwr?boostΒ»
An open source list of malicious domains. Updating in real time.
If you are interested, you can contribute the project.
https://github.com/scafroglia93/blocklists
βΉοΈ Sent from one of our channel members
π@malwr
If you are interested, you can contribute the project.
https://github.com/scafroglia93/blocklists
βΉοΈ Sent from one of our channel members
π@malwr
GitHub
GitHub - scafroglia93/blocklists
Contribute to scafroglia93/blocklists development by creating an account on GitHub.
π2
A problem with .NET Self-Contained Apps and how to pop calculators in dnSpy - or be careful when analysing .NET code from untrusted sources with dnSpy
π£digicat
π@malwr
π£digicat
π@malwr
Washi
A problem with .NET Self-Contained Apps and how to pop calculators in dnSpy
Programming languages that operate on a virtual machine often promise safety guards against many unsafe operations. However, virtual machines can have pretty serious bugs. In this post, we explore one interesting limitation of self-contained applicationsβ¦
Computer System Interrupts: Details how hardware and software components interact to handle interrupts efficiently. Flowchart, Code, and Real-world Example.
π£Soggy_Dingo_2767
π@malwr
π£Soggy_Dingo_2767
π@malwr
Datastructure Digest
Computer System Interrupts
Computer System Interrupts From pressing a key on your keyboard to displaying text on the screen, computer system interrupts play a key role. This blog post will review the hardware and software interactions facilitating this process.
Malware News pinned Β«Guys with premium telegram account, boost please: https://t.me/malwr?boostΒ»
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
π£digicat
π@malwr
π£digicat
π@malwr
Unit 42
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
APT Stately Taurus (aka Mustang Panda) conducted cyberespionage against a Southeast Asian government, including data exfiltration from compromised networks.