Malware News pinned Β«Guys with premium telegram account, boost please: https://t.me/malwr?boostΒ»
How to Get a Reverse Shell on macOS Using A Flipper Zero as a BadUSB
π£cybersourcenews
You plug it in.
π€One_Doubt_75
π@malwr
π£cybersourcenews
You plug it in.
π€One_Doubt_75
π@malwr
Affordable SIEM labs/learning
Besides setting up a home lab to learn SIEM tools, are there pre-made SIEM labs one can purchase? More importantly, any Splunk training available that are not from Spunk? Which SIEM tools should one focus on? Apologies if this was similarly asked.
π£greytrain09
Elasticsearch has a nice huge swath of FREE to use
π€sirrush7
Immersive labs have splunk and elastic
Blue team level 1 uses splunk
Titan labs do ArcSight
π€Reverse_Quikeh
π@malwr
Besides setting up a home lab to learn SIEM tools, are there pre-made SIEM labs one can purchase? More importantly, any Splunk training available that are not from Spunk? Which SIEM tools should one focus on? Apologies if this was similarly asked.
π£greytrain09
Elasticsearch has a nice huge swath of FREE to use
π€sirrush7
Immersive labs have splunk and elastic
Blue team level 1 uses splunk
Titan labs do ArcSight
π€Reverse_Quikeh
π@malwr
Reddit
From the cybersecurity community on Reddit
Explore this post and more from the cybersecurity community
Malware News pinned Β«Guys with premium telegram account, boost please: https://t.me/malwr?boostΒ»
An open source list of malicious domains. Updating in real time.
If you are interested, you can contribute the project.
https://github.com/scafroglia93/blocklists
βΉοΈ Sent from one of our channel members
π@malwr
If you are interested, you can contribute the project.
https://github.com/scafroglia93/blocklists
βΉοΈ Sent from one of our channel members
π@malwr
GitHub
GitHub - scafroglia93/blocklists
Contribute to scafroglia93/blocklists development by creating an account on GitHub.
π2
A problem with .NET Self-Contained Apps and how to pop calculators in dnSpy - or be careful when analysing .NET code from untrusted sources with dnSpy
π£digicat
π@malwr
π£digicat
π@malwr
Washi
A problem with .NET Self-Contained Apps and how to pop calculators in dnSpy
Programming languages that operate on a virtual machine often promise safety guards against many unsafe operations. However, virtual machines can have pretty serious bugs. In this post, we explore one interesting limitation of self-contained applicationsβ¦
Computer System Interrupts: Details how hardware and software components interact to handle interrupts efficiently. Flowchart, Code, and Real-world Example.
π£Soggy_Dingo_2767
π@malwr
π£Soggy_Dingo_2767
π@malwr
Datastructure Digest
Computer System Interrupts
Computer System Interrupts From pressing a key on your keyboard to displaying text on the screen, computer system interrupts play a key role. This blog post will review the hardware and software interactions facilitating this process.
Malware News pinned Β«Guys with premium telegram account, boost please: https://t.me/malwr?boostΒ»
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
π£digicat
π@malwr
π£digicat
π@malwr
Unit 42
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
APT Stately Taurus (aka Mustang Panda) conducted cyberespionage against a Southeast Asian government, including data exfiltration from compromised networks.
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
π£digicat
π@malwr
π£digicat
π@malwr
Unit 42
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
We analyze waves of attacks on a Southeast Asian government linked to Alloy Taurus. By exploiting exchange servers, the attackers established a foothold for long-term espionage.
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
π£digicat
π@malwr
π£digicat
π@malwr
Unit 42
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
Threat activity targeting a Southeast Asian government could provide insight into the workings of APT Gelsemium. We examine the rare TTPs we observed in two attacks.
kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel
π£digicat
π@malwr
π£digicat
π@malwr
GitHub
GitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel
A tool for checking the security hardening options of the Linux kernel - a13xp0p0v/kernel-hardening-checker
MaldevAcademyLdr.1: October update saw several interesting modules being released to our users. One of them was our DLL loader that was successfully tested against several EDRs including MDE and Crowdstrike - We promised to release an EXE
π£digicat
π@malwr
π£digicat
π@malwr
GitHub
GitHub - Maldev-Academy/MaldevAcademyLdr.1: RunPE implementation with multiple evasive techniques (1)
RunPE implementation with multiple evasive techniques (1) - Maldev-Academy/MaldevAcademyLdr.1
DHS Issues Recommendations to Harmonize Cyber Incident Reporting for Critical Infrastructure Entities
π£digicat
π@malwr
π£digicat
π@malwr
www.dhs.gov
DHS Issues Recommendations to Harmonize Cyber Incident Reporting for Critical Infrastructure Entities | Homeland Security
DHS outlined a series of actionable recommendations on how the federal government can streamline and harmonize the reporting of cyber incidents to better protect the nationβs critical infrastructure. These recommendations provide a clear path forward forβ¦
β€1