Malware News
13K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Ransomwareโ€™s Christmas Carol

Around mid-year, Lab52 published a report on ransomware that included both geopolitical and cyber intelligence content. The report includes the analysis of different sources of information and showcasing some of our cyberintelligence findings in this regard. However, the activity of this type of malware prompts Lab52 to closely track the various recorded cases. Therefore, taking...

https://lab52.io/blog/ransomware-2023/


๐ŸŽ–@malwr
๐ŸŽ–@malwr
โค5
Technical Advisory โ€“ Multiple Vulnerabilities in PandoraFMS Enterprise

https://research.nccgroup.com/2024/01/02/technical-advisory-multiple-vulnerabilities-in-pandorafms-enterprise/


๐ŸŽ–@malwr
Hunting for Cobalt Strike in PCAP

In this video I analyze a pcap file from Triage with network traffic from Cobalt Strike Beacon using CapLoader. The video cannot be played in your browser. The pcap file and Cobalt Strike malware config can be downloaded from Recorded Future's Triage sandbox. Cobalt Strike Beacon configs can also be...

https://www.netresec.com/?page=Blog&month=2024-01&post=Hunting-for-Cobalt-Strike-in-PCAP


๐ŸŽ–@malwr
The Artemis security scanner

Artemis is an open-source security vulnerability scanner developed by CERT PL. It is built to look for website misconfigurations and vulnerabilities on a large number of sites. It automatically prepares reports that can be sent to the affected institutions. Thanks to its modular architecture, it can be used to combine the results of various other tools in a single dashboard.

https://cert.pl/en/posts/2024/01/artemis-security-scanner/


๐ŸŽ–@malwr
Private Eyes: Chinaโ€™s Embrace of Open-Source Military Intelligence

Using advanced technology, the People's Liberation Army (PLA) leverages open-source intelligence (OSINT) for military advantage.

https://www.recordedfuture.com/blog/private-eyes-chinas-embrace-open-source-military-intelligence


๐ŸŽ–@malwr
North Koreaโ€™s Cyber Strategy

Insikt Group analysis reveals that North Korea uses a cyber strategy centered around aggressive data collection and financial theft to primarily target Asia.

https://www.recordedfuture.com/blog/north-koreas-cyber-strategy


๐ŸŽ–@malwr
The Escalating Global Risk Environment for Submarine Cables

Explore the rising global risks to submarine cables from geopolitical tension, cyber threats, and expanding tech giant ownership.

https://www.recordedfuture.com/blog/escalating-global-risk-environment-submarine-cables


๐ŸŽ–@malwr
Putinโ€™s Potential Successors Part 2: Aleksey Dyumin

Explore Aleksey Dyumin, potential successor to Putin as Russian president, including his political strengths, weaknesses, and implications for Russia's future.

https://www.recordedfuture.com/blog/putins-potential-successors-part-2-aleksey-dyumin


๐ŸŽ–@malwr
๐Ÿ‘Ž2
The Escalating Global Risk Environment for Submarine Cables

Explore the rising global risks to submarine cables from geopolitical tension, cyber threats, and expanding tech giant ownership.

https://www.recordedfuture.com/escalating-global-risk-environment-submarine-cables


๐ŸŽ–@malwr
๐Ÿ“Forward posts to other groups ๐Ÿ“
๐Ÿ‘1
Video series discussing the major threat actor trends from 2023

In this video series, Talosโ€™ Director of Threat Intelligence and Interdiction Matt Olney and Head of Outreach Nick Biasini share their insights on the most significant cybersecurity threats from the past year.

https://blog.talosintelligence.com/video-series/


๐ŸŽ–@malwr
Charting Chinaโ€™s Climb as a Leading Global Cyber Power

Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years.

https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power


๐ŸŽ–@malwr
New decryptor for Babuk Tortilla ransomware variant released

Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor.

https://blog.talosintelligence.com/decryptor-babuk-tortilla/


๐ŸŽ–@malwr