Malware News pinned «Guys with premium telegram account, boost please: https://t.me/malwr?boost»
An open source list of malicious domains. Updating in real time.
If you are interested, you can contribute the project.
https://github.com/scafroglia93/blocklists
ℹ️ Sent from one of our channel members
🎖@malwr
If you are interested, you can contribute the project.
https://github.com/scafroglia93/blocklists
ℹ️ Sent from one of our channel members
🎖@malwr
GitHub
GitHub - scafroglia93/blocklists
Contribute to scafroglia93/blocklists development by creating an account on GitHub.
👍2
A problem with .NET Self-Contained Apps and how to pop calculators in dnSpy - or be careful when analysing .NET code from untrusted sources with dnSpy
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
Washi
A problem with .NET Self-Contained Apps and how to pop calculators in dnSpy
Programming languages that operate on a virtual machine often promise safety guards against many unsafe operations. However, virtual machines can have pretty serious bugs. In this post, we explore one interesting limitation of self-contained applications…
Computer System Interrupts: Details how hardware and software components interact to handle interrupts efficiently. Flowchart, Code, and Real-world Example.
🗣Soggy_Dingo_2767
🎖@malwr
🗣Soggy_Dingo_2767
🎖@malwr
Datastructure Digest
Computer System Interrupts
Computer System Interrupts From pressing a key on your keyboard to displaying text on the screen, computer system interrupts play a key role. This blog post will review the hardware and software interactions facilitating this process.
Malware News pinned «Guys with premium telegram account, boost please: https://t.me/malwr?boost»
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
Unit 42
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
APT Stately Taurus (aka Mustang Panda) conducted cyberespionage against a Southeast Asian government, including data exfiltration from compromised networks.
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
Unit 42
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
We analyze waves of attacks on a Southeast Asian government linked to Alloy Taurus. By exploiting exchange servers, the attackers established a foothold for long-term espionage.
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
Unit 42
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
Threat activity targeting a Southeast Asian government could provide insight into the workings of APT Gelsemium. We examine the rare TTPs we observed in two attacks.
kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
GitHub
GitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel
A tool for checking the security hardening options of the Linux kernel - a13xp0p0v/kernel-hardening-checker
MaldevAcademyLdr.1: October update saw several interesting modules being released to our users. One of them was our DLL loader that was successfully tested against several EDRs including MDE and Crowdstrike - We promised to release an EXE
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
GitHub
GitHub - Maldev-Academy/MaldevAcademyLdr.1: RunPE implementation with multiple evasive techniques (1)
RunPE implementation with multiple evasive techniques (1) - Maldev-Academy/MaldevAcademyLdr.1
DHS Issues Recommendations to Harmonize Cyber Incident Reporting for Critical Infrastructure Entities
🗣digicat
🎖@malwr
🗣digicat
🎖@malwr
www.dhs.gov
DHS Issues Recommendations to Harmonize Cyber Incident Reporting for Critical Infrastructure Entities | Homeland Security
DHS outlined a series of actionable recommendations on how the federal government can streamline and harmonize the reporting of cyber incidents to better protect the nation’s critical infrastructure. These recommendations provide a clear path forward for…
❤1