Malware News
13K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spyware

Talos revealed that rebooting an iOS or Android device may not remove the Predator spyware produced by Intellexa. Intellexa knows if their customers intend to perform surveillance operations on foreign soil.

https://blog.talosintelligence.com/intellexa-and-cytrox-intel-agency-grade-spyware/


🎖@malwr
Ransomware’s Christmas Carol

Around mid-year, Lab52 published a report on ransomware that included both geopolitical and cyber intelligence content. The report includes the analysis of different sources of information and showcasing some of our cyberintelligence findings in this regard. However, the activity of this type of malware prompts Lab52 to closely track the various recorded cases. Therefore, taking...

https://lab52.io/blog/ransomware-2023/


🎖@malwr
🎖@malwr
5
Hunting for Cobalt Strike in PCAP

In this video I analyze a pcap file from Triage with network traffic from Cobalt Strike Beacon using CapLoader. The video cannot be played in your browser. The pcap file and Cobalt Strike malware config can be downloaded from Recorded Future's Triage sandbox. Cobalt Strike Beacon configs can also be...

https://www.netresec.com/?page=Blog&month=2024-01&post=Hunting-for-Cobalt-Strike-in-PCAP


🎖@malwr
The Artemis security scanner

Artemis is an open-source security vulnerability scanner developed by CERT PL. It is built to look for website misconfigurations and vulnerabilities on a large number of sites. It automatically prepares reports that can be sent to the affected institutions. Thanks to its modular architecture, it can be used to combine the results of various other tools in a single dashboard.

https://cert.pl/en/posts/2024/01/artemis-security-scanner/


🎖@malwr
Private Eyes: China’s Embrace of Open-Source Military Intelligence

Using advanced technology, the People's Liberation Army (PLA) leverages open-source intelligence (OSINT) for military advantage.

https://www.recordedfuture.com/blog/private-eyes-chinas-embrace-open-source-military-intelligence


🎖@malwr
North Korea’s Cyber Strategy

Insikt Group analysis reveals that North Korea uses a cyber strategy centered around aggressive data collection and financial theft to primarily target Asia.

https://www.recordedfuture.com/blog/north-koreas-cyber-strategy


🎖@malwr
The Escalating Global Risk Environment for Submarine Cables

Explore the rising global risks to submarine cables from geopolitical tension, cyber threats, and expanding tech giant ownership.

https://www.recordedfuture.com/blog/escalating-global-risk-environment-submarine-cables


🎖@malwr
Putin’s Potential Successors Part 2: Aleksey Dyumin

Explore Aleksey Dyumin, potential successor to Putin as Russian president, including his political strengths, weaknesses, and implications for Russia's future.

https://www.recordedfuture.com/blog/putins-potential-successors-part-2-aleksey-dyumin


🎖@malwr
👎2
The Escalating Global Risk Environment for Submarine Cables

Explore the rising global risks to submarine cables from geopolitical tension, cyber threats, and expanding tech giant ownership.

https://www.recordedfuture.com/escalating-global-risk-environment-submarine-cables


🎖@malwr
📍Forward posts to other groups 📍
👍1