The Artemis security scanner
Artemis is an open-source security vulnerability scanner developed by CERT PL. It is built to look for website misconfigurations and vulnerabilities on a large number of sites. It automatically prepares reports that can be sent to the affected institutions. Thanks to its modular architecture, it can be used to combine the results of various other tools in a single dashboard.
https://cert.pl/en/posts/2024/01/artemis-security-scanner/
π@malwr
Artemis is an open-source security vulnerability scanner developed by CERT PL. It is built to look for website misconfigurations and vulnerabilities on a large number of sites. It automatically prepares reports that can be sent to the affected institutions. Thanks to its modular architecture, it can be used to combine the results of various other tools in a single dashboard.
https://cert.pl/en/posts/2024/01/artemis-security-scanner/
π@malwr
cert.pl
The Artemis security scanner
Artemis is an open-source security vulnerability scanner developed by CERT PL. It is built to look for website misconfigurations and vulnerabilities on a large number of sites. It automatically prepares reports that can be sent to the affected institutions.β¦
Private Eyes: Chinaβs Embrace of Open-Source Military Intelligence
Using advanced technology, the People's Liberation Army (PLA) leverages open-source intelligence (OSINT) for military advantage.
https://www.recordedfuture.com/blog/private-eyes-chinas-embrace-open-source-military-intelligence
π@malwr
Using advanced technology, the People's Liberation Army (PLA) leverages open-source intelligence (OSINT) for military advantage.
https://www.recordedfuture.com/blog/private-eyes-chinas-embrace-open-source-military-intelligence
π@malwr
North Koreaβs Cyber Strategy
Insikt Group analysis reveals that North Korea uses a cyber strategy centered around aggressive data collection and financial theft to primarily target Asia.
https://www.recordedfuture.com/blog/north-koreas-cyber-strategy
π@malwr
Insikt Group analysis reveals that North Korea uses a cyber strategy centered around aggressive data collection and financial theft to primarily target Asia.
https://www.recordedfuture.com/blog/north-koreas-cyber-strategy
π@malwr
The Escalating Global Risk Environment for Submarine Cables
Explore the rising global risks to submarine cables from geopolitical tension, cyber threats, and expanding tech giant ownership.
https://www.recordedfuture.com/blog/escalating-global-risk-environment-submarine-cables
π@malwr
Explore the rising global risks to submarine cables from geopolitical tension, cyber threats, and expanding tech giant ownership.
https://www.recordedfuture.com/blog/escalating-global-risk-environment-submarine-cables
π@malwr
Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity
Insikt Group identified an application disseminated on a Telegram Channel used by members or supporters of the Hamas terrorist organization
https://www.recordedfuture.com/blog/hamas-application-infrastructure-reveals-possible-overlap-tag-63-iranian-threat-activity
π@malwr
Insikt Group identified an application disseminated on a Telegram Channel used by members or supporters of the Hamas terrorist organization
https://www.recordedfuture.com/blog/hamas-application-infrastructure-reveals-possible-overlap-tag-63-iranian-threat-activity
π@malwr
Recordedfuture
Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity | Recorded Future
Insikt Group identified an application disseminated on a Telegram Channel used by members or supporters of the Hamas terrorist organization
Putinβs Potential Successors Part 2: Aleksey Dyumin
Explore Aleksey Dyumin, potential successor to Putin as Russian president, including his political strengths, weaknesses, and implications for Russia's future.
https://www.recordedfuture.com/blog/putins-potential-successors-part-2-aleksey-dyumin
π@malwr
Explore Aleksey Dyumin, potential successor to Putin as Russian president, including his political strengths, weaknesses, and implications for Russia's future.
https://www.recordedfuture.com/blog/putins-potential-successors-part-2-aleksey-dyumin
π@malwr
π2
The Escalating Global Risk Environment for Submarine Cables
Explore the rising global risks to submarine cables from geopolitical tension, cyber threats, and expanding tech giant ownership.
https://www.recordedfuture.com/escalating-global-risk-environment-submarine-cables
π@malwr
Explore the rising global risks to submarine cables from geopolitical tension, cyber threats, and expanding tech giant ownership.
https://www.recordedfuture.com/escalating-global-risk-environment-submarine-cables
π@malwr
Explained: SMTP smuggling
https://www.malwarebytes.com/blog/news/2024/01/explained-smtp-smuggling
π@malwr
https://www.malwarebytes.com/blog/news/2024/01/explained-smtp-smuggling
π@malwr
ThreatDown by Malwarebytes
Explained: SMTP smuggling - ThreatDown by Malwarebytes
Researchers have found flaws in the way SMTP servers handle messages, allowing them to send spoofed emails to and from targets.
Cracking the 2023 SANS Holiday Hack Challenge
From ChatNPT to Game Boys and space apps, this yearβs challenge took us to the Geese Islands for another rollicking romp of fun
https://www.welivesecurity.com/en/cybersecurity/cracking-2023-sans-holiday-hack-challenge/
π@malwr
From ChatNPT to Game Boys and space apps, this yearβs challenge took us to the Geese Islands for another rollicking romp of fun
https://www.welivesecurity.com/en/cybersecurity/cracking-2023-sans-holiday-hack-challenge/
π@malwr
Welivesecurity
Cracking the 2023 SANS Holiday Hack Challenge
From ChatNPT to Game Boys and space apps, the 2023 SANS Holiday Hack Challenge took us to the Geese Islands for another rollicking romp of fun
Video series discussing the major threat actor trends from 2023
In this video series, Talosβ Director of Threat Intelligence and Interdiction Matt Olney and Head of Outreach Nick Biasini share their insights on the most significant cybersecurity threats from the past year.
https://blog.talosintelligence.com/video-series/
π@malwr
In this video series, Talosβ Director of Threat Intelligence and Interdiction Matt Olney and Head of Outreach Nick Biasini share their insights on the most significant cybersecurity threats from the past year.
https://blog.talosintelligence.com/video-series/
π@malwr
Cisco Talos Blog
Video series discussing the major threat actor trends from 2023
In this video series, Talosβ Director of Threat Intelligence and Interdiction Matt Olney and Head of Outreach Nick Biasini share their insights on the most significant cybersecurity threats from the past year.
.NET Hooking β Harmonizing Managed Territory
https://research.checkpoint.com/2024/net-hooking-harmonizing-managed-territory/
π@malwr
https://research.checkpoint.com/2024/net-hooking-harmonizing-managed-territory/
π@malwr
Check Point Research
.NET Hooking - Harmonizing Managed Territory - Check Point Research
Research by: Jiri Vinopal Key Points Introduction For a malware researcher, analyst, or reverse engineer, the ability to alter the functionality of certain parts of code is a crucial step, often necessary to reach a meaningful result during the analysis process.β¦
Charting Chinaβs Climb as a Leading Global Cyber Power
Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years.
https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power
π@malwr
Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years.
https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power
π@malwr
How to detect Flipper Zero and Bluetooth advertisement attacks using Android app
https://www.mobile-hacker.com/2024/01/09/how-to-detect-flipper-zero-and-bluetooth-advertisement-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-detect-flipper-zero-and-bluetooth-advertisement-attacks
π@malwr
https://www.mobile-hacker.com/2024/01/09/how-to-detect-flipper-zero-and-bluetooth-advertisement-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-detect-flipper-zero-and-bluetooth-advertisement-attacks
π@malwr
Mobile Hacker
How to detect Flipper Zero and Bluetooth advertisement attacks using Android app Mobile Hacker
In October 2023, was in Flipper Zeroβs unofficial Xtreme firmware implemented functionality that would perform Denial of Service attack (DoS) that resulted in freezing and crashing any iPhones running the latest iOS 17. This bug was fixed in December 2023β¦
New decryptor for Babuk Tortilla ransomware variant released
Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor.
https://blog.talosintelligence.com/decryptor-babuk-tortilla/
π@malwr
Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor.
https://blog.talosintelligence.com/decryptor-babuk-tortilla/
π@malwr
Cisco Talos Blog
New decryptor for Babuk Tortilla ransomware variant released
Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor.
Rust for Security and Correctness in the embedded world
https://research.nccgroup.com/2024/01/09/rust-for-security-and-correctness-in-the-embedded-world/
π@malwr
https://research.nccgroup.com/2024/01/09/rust-for-security-and-correctness-in-the-embedded-world/
π@malwr
NCC Group Research Blog
Rust for Security and Correctness in the embedded world
Increasingly large companies are utilising Rust in their systems, either existing or new. Most uses focus on how it can help in managed environments, such as within a system with a rβ¦
The January 2024 Security Update Review
https://www.thezdi.com/blog/2024/1/9/the-january-2024-security-update-review
π@malwr
https://www.thezdi.com/blog/2024/1/9/the-january-2024-security-update-review
π@malwr
Zero Day Initiative
Zero Day Initiative β The January 2024 Security Update Review
Welcome to the first patch Tuesday of 2024. As expected, Microsoft and Adobe have released their latest security patches. Take a break from your other activities and join us as we review the details of their latest advisories. If youβd rather watch the videoβ¦
2024-01-09 - Async RAT infection
https://www.malware-traffic-analysis.net/2024/01/09/index.html
π@malwr
https://www.malware-traffic-analysis.net/2024/01/09/index.html
π@malwr
2024-01-08 - GootLoader infection
https://www.malware-traffic-analysis.net/2024/01/08/index.html
π@malwr
https://www.malware-traffic-analysis.net/2024/01/08/index.html
π@malwr
Examining the Activities of the Turla APT Group
We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group.
https://www.trendmicro.com/en_us/research/23/i/examining-the-activities-of-the-turla-group.html
π@malwr
We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group.
https://www.trendmicro.com/en_us/research/23/i/examining-the-activities-of-the-turla-group.html
π@malwr
Trend Micro
Examining the Activities of the Turla APT Group
We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group.
Atomic Stealer rings in the new year with updated version
https://www.malwarebytes.com/blog/threat-intelligence/2024/01/atomic-stealer-rings-in-the-new-year-with-updated-version
π@malwr
https://www.malwarebytes.com/blog/threat-intelligence/2024/01/atomic-stealer-rings-in-the-new-year-with-updated-version
π@malwr
Malwarebytes
Atomic Stealer rings in the new year with updated version
Mac users should be aware of an active distribution campaign via malicious ads delivering Atomic Stealer. The latest iteration of the malware is stealthy thanks to added encryption and obfuscation of its code.