Article: How Much Do Hackers Know About You? - published over 8 years ago. Content: The threat of black hat hackers has never been greater than now, considering the increasing organization of their efforts to make a dollar off of your digital assets and information. The common portrayal of the hacker is someone who knows enough about programming and the internet that they can seemingly access any information or know anything about anyone.Th... http://www.rafayhackingarticles.net/2016/04/how-much-do-hackers-know-about-you.html Published: 2016 04 13 14:07:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
Article: Bypassing Browser Security Policies for Fun and Profit (Full Presentation Video) - published over 8 years ago. Content: Blackhat has just recently released the full video for my talk on the subject of "Browser Security", If you wish to read the Whitepaper/Slides and SOP Test Suite, you can refer to my previous post on "Bypassing Browser Security Policies For Fun And Profit"AbstractMobile browsers in comparison to desktop browsers are relatively new and have not gone under sam... http://www.rafayhackingarticles.net/2016/04/bypassing-browser-security-policies-for-Fun-And-Profit-Full-Video.html Published: 2016 04 21 18:02:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Bypassing Modern WAF's Exemplified At XSS (Webcast) - published over 8 years ago. Content: Past Saturday, I conducted a "Webcast" on "Garage4hackers" on one of my favorite subjects in the field of Information Security i.e. "WAF Bypass". Initially, i had decided to present something on the topic of "Mobile Browser Security" due to the fact that this has been a topic I have been recently conducting a research on.However i later realized that the "Ta... http://www.rafayhackingarticles.net/2016/05/bypassing-modern-wafs-exemplified-at-xss.html Published: 2016 05 03 21:37:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Acunetix Website Hack And Lessons Learnt - published over 8 years ago. Content: Update: Acunetix has just released an official response about the incident, read it here.Last night, Website of Acunetix(A Wellknown Automated Web Application Scanner) was hacked by Croatian hackers. From that point of this onward the website has been taken offline and acunetix team are reviewing the root cause for the hack. Currently the homepage is display... http://www.rafayhackingarticles.net/2016/06/acunetix-website-hack-and-lessons-learnt.html Published: 2016 06 05 08:35:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
Article: Wordpress Mobile Detector Incorrect Fix Leads To Stored XSS - published over 8 years ago. Content: Recently, Wordpress Mobile Detector plugin was in news for the "Remote Code Execution" vulnerability that was found inside the resize.php file. The vulnerability allowed an external attacker to upload arbitrary files to the server as there was no validation being performed for the file-type that has to be retrieved from an external source.Soon after the vuln... http://www.rafayhackingarticles.net/2016/06/wordpress-mobile-detector-incorrect-fix-leads-to-stored-xss.html Published: 2016 06 13 07:58:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Google Chrome, Firefox Address Bar Spoofing Vulnerability - published over 8 years ago. Content: IntroductionGoogle security team themselves state that "We recognize that the address bar is the only reliable security indicator in modern browsers" and if the only reliable security indicator could be controlled by an attacker it could carry adverse affects, For instance potentially tricking users into supplying sensitive information to a malicious website... http://www.rafayhackingarticles.net/2016/08/google-chrome-firefox-address-bar.html Published: 2016 08 16 06:16:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Breaking The Great Wall of Web - XSS WAF Evasion CheatSheet - published about 8 years ago. Content: I think it's mandatory to give back to Security community from where we learn cutting edge techniques and information. Therefore after months of effort i am presenting to you a new WhitePaper titled "Breaking Great Wall of Web" without any strings attached. AcknowledgementsI would like to thank the Acunetix Team for helping with proof-reading of the document... http://www.rafayhackingarticles.net/2016/09/breaking-great-wall-of-web-xss-waf.html Published: 2016 09 01 10:07:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
Article: Whatsapp 4G VIP SCAM - Technical Analysis - published about 8 years ago. Content: This is a short blog post describing about a recent hoax pertaining the WhatsApp 4.0 version. I would like to clearly highlight that there is no such application as 'Whatsapp 4G'. The version promises users unrealistic features video calling, new whatsapp themes, delete sent messages from both sides etcThe following is how the message is being propagated:T... http://www.rafayhackingarticles.net/2016/09/whatsapp-4g-vip-scam-technical-analysis.html Published: 2016 09 06 10:21:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: How Pakistan's Critical Infrastructure Was Hacked? - Technical Analysis - published over 7 years ago. Content: There have been multiple reports leaked from various sources about NSA hacking into Pakistan's Internet infrastructure ranging from Core Routers to Pakistan Telecommunication Green Line Communication Network in order to intercept Pakistan's civilian and military leadership communication. In October last year, a group called "Shadow Brokers" leaked comprehens... http://www.rafayhackingarticles.net/2017/04/how-pakistans-critical-internet-Infrastructure-was-hacked.html Published: 2017 04 11 17:43:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Is OneCoin A Scam? - Technical Analysis - published over 7 years ago. Content: TL;dr: People should refrain from any type of Pyramid Scheme especially when it comes to Cryptocurrency:Onecoin is a Cryptocurrency that has been dubbed as Ponzi Scam and the evidence surrounding it is considerate. The way it works is that members buy training packages that come up with "tokens" and these tokens can be utilized for mining. After mining has... http://www.rafayhackingarticles.net/2017/05/is-onecoin-scam-technical-analysis.html Published: 2017 05 02 08:34:00 Received: 2021 06 06 09:04:44 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
Article: Want to be a cybersecurity manager? Colonial Pipeline is recruiting - published over 3 years ago. Content: https://grahamcluley.com/want-to-be-a-cybersecurity-manager-colonial-pipeline-is-recruiting/ Published: 2021 05 14 10:33:58 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Gamers warned of downloading fake Afterburner overclocking tool to boost graphics card performance - published over 3 years ago. Content: https://hotforsecurity.bitdefender.com/blog/gamers-warned-of-downloading-fake-afterburner-overclocking-tool-to-boost-graphics-card-performance-25830.html Published: 2021 05 14 14:54:38 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Cyber insurance giant AXA hit by ransomware attack after saying it would stop covering ransom payments - published over 3 years ago. Content: https://grahamcluley.com/cyber%20insurance-giant-axa-hit-by-ransomware-attack-after-saying-it-would-stop-covering-ransom-payments/ Published: 2021 05 17 10:25:59 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
Article: Apple rejected 215,000 iOS apps due to privacy concerns last year - published over 3 years ago. Content: https://hotforsecurity.bitdefender.com/blog/apple-rejected-215000-ios-apps-due-to-privacy-concerns-last-year-25839.html Published: 2021 05 18 09:04:21 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Fake Microsoft Authenticator extension discovered in Chrome Store - published over 3 years ago. Content: https://hotforsecurity.bitdefender.com/blog/fake-microsoft-authenticator-extension-discovered-in-chrome-store-25845.html Published: 2021 05 19 16:02:46 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Smashing Security podcast #228: Pipeline pickle, Blockchain bollocks, and Eufy SNAFU - published over 3 years ago. Content: https://grahamcluley.com/smashing-security-podcast-228/ Published: 2021 05 20 09:01:12 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
Article: Qlocker ransomware gang shuts shop after extorting owners of QNAP NAS drives - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/featured/qlocker-ransomware-gang-shuts-shop-extorting-qnap-nas-drives/ Published: 2021 05 20 13:48:48 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Cyber insurance giant CNA paid out $40 million to its ransomware attackers - published over 3 years ago. Content: https://grahamcluley.com/cyber-insurance-giant-cna-paid-out-40-million-to-its-ransomware-attackers/ Published: 2021 05 20 23:03:54 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Malware exploited macOS zero-day flaw to secretly take screenshots. Update to Big Sur 11.4 now - published over 3 years ago. Content: https://hotforsecurity.bitdefender.com/blog/malware-exploited-macos-zero-day-flaw-to-secretly-take-screenshots-update-to-big-sur-11-4-now-25884.html Published: 2021 05 25 14:16:16 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
Article: Get FREE threat intelligence on hackers and exploits with the Recorded Future Cyber Daily - published over 3 years ago. Content: https://grahamcluley.com/recorded-future-feed-sponsor-9/ Published: 2021 05 26 13:40:38 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Smashing Security podcast #229: Dating leaks, right to repair, and a stinky bishop - published over 3 years ago. Content: https://grahamcluley.com/smashing-security-podcast-229-dating-leaks-right-to-repair-and-a-stinky-bishop/ Published: 2021 05 27 00:01:55 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Cryptocurrency scam attack on Twitter reminds users to check their app connections - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/featured/cryptocurrency-scam-attack-twitter-check-app-connections/ Published: 2021 05 27 13:12:16 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
Article: Let’s talk ransomware with the experts from Acronis - published over 3 years ago. Content: https://grahamcluley.com/lets-talk-ransomware-with-the-experts-from-acronis/ Published: 2021 05 28 13:34:09 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: US Army tells remote workers to switch off their IoT devices (and then withdraws advice) - published over 3 years ago. Content: https://www.bitdefender.com/box/blog/iot-news/us-army-tells-remote-workers-switch-off-iot-devices-withdraws-advice/ Published: 2021 05 31 16:07:31 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: World’s biggest meat supplier, JBS, suffers cyber attack - published over 3 years ago. Content: https://grahamcluley.com/worlds-biggest-meat-supplier-jbs-suffers-cyber-attack/ Published: 2021 06 01 09:49:20 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
Article: Babuk ransomware gang says it’s no longer interested in encrypting data, would rather kidnap it instead - published over 3 years ago. Content: https://hotforsecurity.bitdefender.com/blog/babuk-ransomware-gang-says-its-no-longer-interested-in-encrypting-data-would-rather-kidnap-it-instead-25910.html Published: 2021 06 02 13:17:45 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Smashing Security podcast #230: Flash card f-up and energy pipe pilfering - published over 3 years ago. Content: https://grahamcluley.com/smashing-security-podcast-230/ Published: 2021 06 03 09:33:31 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: It’s time to get serious about enterprise password management – download this 1Password white paper now - published over 3 years ago. Content: https://grahamcluley.com/feed-sponsor-1password-2/ Published: 2021 06 18 09:42:03 Received: 2021 06 06 09:04:44 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
Article: Backup appliance firm pays out $2.6 million ransom to attackers - published over 3 years ago. Content: https://grahamcluley.com/backup-appliance-firm-pays-out-2-6-million-ransom-to-attackers/ Published: 2021 06 03 13:16:40 Received: 2021 06 06 09:04:43 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: Cryptocurrency hacks wanted – $100,000 prize fund offered in contest run by cybercrime forum - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/cryptocurrency-hacks-wanted-100000-prize-fund-offered-in-cybercrime-forum-contest/ Published: 2021 06 03 17:08:40 Received: 2021 06 06 09:04:43 Feed: Graham Cluley Source: Graham Cluley Category: Cyber Security Topic: Cyber Security |
|
Article: "Orcus Rat” Author Finally Raided By Canadian Police - published over 5 years ago. Content: http://www.ehacking.net/2019/04/orcus-rat-author-finally-raided-by.html Published: 2019 04 03 11:19:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: Alleged Main Leader of Romanian ATM Skimming Group Arrested in Mexico - published over 5 years ago. Content: http://www.ehacking.net/2019/04/alleged-main-leader-of-romanian-atm.html Published: 2019 04 05 11:27:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: Complex Malware 'Exodus' Found Hitting Apple iOS Holders - published over 5 years ago. Content: http://www.ehacking.net/2019/04/complex-malware-exodus-found-hitting.html Published: 2019 04 09 12:35:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: WikiLeaks Creator Julian Assange Arrested After Ecuador Withdraws Asylum - published over 5 years ago. Content: http://www.ehacking.net/2019/04/wikileaks-creator-julian-assange.html Published: 2019 04 11 11:06:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: Stay Alert!: Learn How web forms can steal your information and destroy your business identity - published over 5 years ago. Content: http://www.ehacking.net/2019/04/stay-alert-learn-how-web-forms-can.html Published: 2019 04 12 13:44:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: Google Makes It Difficult For Rough App Developers Work on Android Play store - published over 5 years ago. Content: http://www.ehacking.net/2019/04/google-makes-it-difficult-for-rough-app.html Published: 2019 04 16 13:32:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: Hacker Hijacks a Microsoft Service Using Loophole in Azure Cloud - published over 5 years ago. Content: http://www.ehacking.net/2019/04/hacker-hijacks-microsoft-service-using.html Published: 2019 04 18 12:08:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: Wipro Invaders Targeted Other Major IT Organization - published over 5 years ago. Content: http://www.ehacking.net/2019/04/wipro-invaders-targeted-other-major-it.html Published: 2019 04 19 12:10:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: Introducing Data Security: Why is it Important for Every Organization? - published over 5 years ago. Content: http://www.ehacking.net/2019/05/introducing-data-security-why-is-it.html Published: 2019 05 06 10:22:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: Acunetix Integrated with OpenVAS for Network Pentest - published over 5 years ago. Content: http://www.ehacking.net/2019/05/acunetix-integrated-with-openvas-for.html Published: 2019 05 22 09:43:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: What Is File Integrity Monitoring (& Scanning) for WordPress, and do you need it? - published over 5 years ago. Content: http://www.ehacking.net/2019/06/what-is-file-integrity-monitoring.html Published: 2019 06 18 11:16:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: How to Choose a Secure Password Manager? - published over 5 years ago. Content: http://www.ehacking.net/2019/07/how-to-choose-secure-password-manager.html Published: 2019 07 01 09:24:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: Reason Security Review: Advanced Protection from Today’s Privacy Threats - published over 5 years ago. Content: http://www.ehacking.net/2019/07/reason-security-review-advanced.html Published: 2019 07 25 07:12:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: Three Key Ways Attack Simulations Can Help Tighten Enterprise Security - published over 5 years ago. Content: http://www.ehacking.net/2019/07/three-key-ways-attack-simulations-can.html Published: 2019 07 26 08:57:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: How to Fix Outlook PST and OST Problem with these Solutions - published over 5 years ago. Content: http://www.ehacking.net/2019/07/how-to-fix-outlook-pst-and-ost-problem.html Published: 2019 07 27 13:54:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: The Future Of iTunes For Windows: Bright or Not Much? - published over 5 years ago. Content: http://www.ehacking.net/2019/08/the-future-of-itunes-for-windows-bright.html Published: 2019 08 26 10:57:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: An Overview of the Jooble Platform - published about 5 years ago. Content: http://www.ehacking.net/2019/08/an-overview-of-jooble-platform.html Published: 2019 08 30 09:36:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: 3 Ways Cyber Security Has Evolved to Combat Phishing and ID Theft - published about 5 years ago. Content: http://www.ehacking.net/2019/11/3-ways-cyber-security-has-evolved-to.html Published: 2019 11 04 07:39:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: How to Become a Cyber Security Expert - published about 5 years ago. Content: http://www.ehacking.net/2019/11/how-to-become-cyber-security-expert.html Published: 2019 11 13 08:41:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: Are there blind spots in your data compliance strategy? - published about 5 years ago. Content: http://www.ehacking.net/2019/11/are-there-blind-spots-in-your-data.html Published: 2019 11 13 08:52:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: Even Small Business Need Penetration Testing - Here’s Why - published about 5 years ago. Content: http://www.ehacking.net/2019/11/even-small-business-need-penetration.html Published: 2019 11 22 12:51:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: Antivirus vs VPN: Which is Better at Preventing Hacking Attacks? - published almost 5 years ago. Content: http://www.ehacking.net/2019/12/antivirus-vs-vpn-which-is-better-at.html Published: 2019 12 02 08:35:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: Best 5 Ways to Track an iPhone Remotely - published almost 5 years ago. Content: http://www.ehacking.net/2019/12/best-5-ways-to-track-iphone-remotely.html Published: 2019 12 02 08:58:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: 5G - A Business Owner’s Dream, A Hacker’s Fantasy - published almost 5 years ago. Content: http://www.ehacking.net/2019/12/5g-business-owners-dream-hackers-fantasy.html Published: 2019 12 10 05:48:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: OSINT tutorial to Find Information from a Phone Number – PhoneInfoga Tool - published almost 5 years ago. Content: http://www.ehacking.net/2019/12/osint-tutorial-phoneinfoga-phone-number-search.html Published: 2019 12 12 10:02:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: [SANS ISC] How Safe Are Your Docker Images? - published over 3 years ago. Content: I published the following diary on isc.sans.edu: “How Safe Are Your Docker Images?“: Today, I don’t know any organization that is not using Docker today. For only test and development only or to full production systems, containers are deployed everywhere! In the same way, most popular tools today have a “dockerized” version ready to use, sometimes mainta... https://blog.rootshell.be/2021/04/22/sans-isc-how-safe-are-your-docker-images/ Published: 2021 04 22 11:01:01 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: [SANS ISC] Malicious PowerPoint Add-On: “Small Is Beautiful” - published over 3 years ago. Content: I published the following diary on isc.sans.edu: “Malicious PowerPoint Add-On: ‘Small Is Beautiful‘”: Yesterday I spotted a DHL-branded phishing campaign that used a PowerPoint file to compromise the victim. The malicious attachment is a PowerPoint add-in. This technique is not new, I already analyzed such a sample in a previous diary. The filename is “d... https://blog.rootshell.be/2021/04/23/sans-isc-malicious-powerpoint-add-on-small-is-beautiful/ Published: 2021 04 23 10:17:04 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: [SANS ISC] From Python to .Net - published over 3 years ago. Content: I published the following diary on isc.sans.edu: “From Python to .Net“: The Microsoft operating system provides the .Net framework to developers. It allows to fully interact with the OS and write powerful applications… but also malicious ones. In a previous diary, I talked about a malicious Python script that interacted with the OS using the ctypes libra... https://blog.rootshell.be/2021/04/29/sans-isc-from-python-to-net/ Published: 2021 04 29 10:46:35 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
Article: [SANS ISC] Alternative Ways To Perform Basic Tasks - published over 3 years ago. Content: I published the following diary on isc.sans.edu: “Alternative Ways To Perform Basic Tasks“: I like to spot techniques used by malware developers to perform basic tasks. We know the LOLBins that are pre-installed tools used to perform malicious activities. Many LOLBins are used, for example, to download some content from the Internet. Some tools are so po... https://blog.rootshell.be/2021/05/06/sans-isc-alternative-ways-to-perform-basic-tasks/ Published: 2021 05 06 10:17:45 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: [SANS ISC] “Open” Access to Industrial Systems Interface is Also Far From Zero - published over 3 years ago. Content: I published the following diary on isc.sans.edu: “‘Open’ Access to Industrial Systems Interface is Also Far From Zero“: Jan’s last diary about the recent attack against the US pipeline was in perfect timing with the quick research I was preparing for a few weeks. If core components of industrial systems are less exposed in the wild, as said Jan, there is... https://blog.rootshell.be/2021/05/14/sans-isc-open-access-to-industrial-systems-interface-is-also-far-from-zero/ Published: 2021 05 14 10:08:16 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: [SANS ISC] From RunDLL32 to JavaScript then PowerShell - published over 3 years ago. Content: I published the following diary on isc.sans.edu: “From RunDLL32 to JavaScript then PowerShell“: I spotted an interesting script on VT a few days ago and it deserves a quick diary because it uses a nice way to execute JavaScript on the targeted system. The technique used in this case is based on very common LOLbin: RunDLL32.exe. The goal of the tool is, a... https://blog.rootshell.be/2021/05/18/sans-isc-from-rundll32-to-javascript-then-powershell/ Published: 2021 05 18 10:31:14 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
Article: [SANS ISC] Locking Kernel32.dll As Anti-Debugging Technique - published over 3 years ago. Content: [Edited: The technique discussed in this diary is not mine and has been used without proper citation of the original author] I published the following diary on isc.sans.edu: “Locking Kernel32.dll As Anti-Debugging Technique“: For bad guys, the implementation of techniques to prevent Security Analysts to perform their job is key! The idea is to make ou... https://blog.rootshell.be/2021/05/21/sans-isc-locking-kernel32-dll-as-anti-debugging-technique/ Published: 2021 05 21 10:29:30 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: [SANS ISC] “Serverless” Phishing Campaign - published over 3 years ago. Content: I published the following diary on isc.sans.edu: “‘Serverless’ Phishing Campaign“: The Internet is full of code snippets and free resources that you can embed in your projects. SmtpJS is one of those small projects that are very interesting for developers but also bad guys. It’s the first time that I spot a phishing campaign that uses this piece of JavaS... https://blog.rootshell.be/2021/05/22/sans-isc-serverless-phishing-campaign/ Published: 2021 05 22 15:10:12 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: [SANS ISC] Malicious PowerShell Hosted on script.google.com - published over 3 years ago. Content: I published the following diary on isc.sans.edu: “Malicious PowerShell Hosted on script.google.com“: Google has an incredible portfolio of services. Besides the classic ones, there are less known services and… they could be very useful for attackers too. One of them is Google Apps Script. Google describes it like this: “Apps Script is a rapid applicat... https://blog.rootshell.be/2021/05/28/sans-isc-malicious-powershell-hosted-on-script-google-com/ Published: 2021 05 28 10:03:48 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
Article: [SANS ISC] Russian Dolls VBS Obfuscation - published over 3 years ago. Content: I published the following diary on isc.sans.edu: “Russian Dolls VBS Obfuscation“: We received an interesting sample from one of our readers (thanks Henry!) and we like this. If you find something interesting, we are always looking for fresh meat! Henry’s sample was delivered in a password-protected ZIP archive and the file was a VBS script called “presen... https://blog.rootshell.be/2021/06/04/sans-isc-russian-dolls-vbs-obfuscation/ Published: 2021 06 04 10:09:58 Received: 2021 06 06 09:04:42 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: Fuzzilli – JavaScript Engine Fuzzing Library - published about 4 years ago. Content: https://www.darknet.org.uk/2020/10/fuzzilli-javascript-engine-fuzzing-library/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2020 10 22 09:04:37 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
Article: Trape – OSINT Analysis Tool For People Tracking - published about 4 years ago. Content: https://www.darknet.org.uk/2020/11/trape-osint-analysis-tool-for-people-tracking/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2020 11 03 10:03:00 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
Article: HELK – Open Source Threat Hunting Platform - published about 4 years ago. Content: https://www.darknet.org.uk/2020/11/helk-open-source-threat-hunting-platform/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2020 11 06 10:46:55 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
Article: zANTI – Android Wireless Hacking Tool Free Download - published almost 4 years ago. Content: https://www.darknet.org.uk/2020/12/zanti-android-wireless-hacking-tool-free-download/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2020 12 07 13:15:28 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
Article: GKE Auditor – Detect Google Kubernetes Engine Misconfigurations - published almost 4 years ago. Content: https://www.darknet.org.uk/2021/01/gke-auditor-detect-google-kubernetes-engine-misconfigurations/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2021 01 01 10:59:21 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
Article: GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials - published almost 4 years ago. Content: https://www.darknet.org.uk/2021/02/gitlab-watchman-audit-gitlab-for-sensitive-data-credentials/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2021 02 03 13:13:35 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
Article: APT-Hunter – Threat Hunting Tool via Windows Event Log - published over 3 years ago. Content: https://www.darknet.org.uk/2021/03/apt-hunter-threat-hunting-tool-via-windows-event-log/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2021 03 04 17:16:01 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
Article: Grype – Vulnerability Scanner For Container Images & Filesystems - published over 3 years ago. Content: https://www.darknet.org.uk/2021/04/grype-vulnerability-scanner-for-container-images-filesystems/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2021 04 19 10:11:41 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
Article: LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) - published over 3 years ago. Content: https://www.darknet.org.uk/2021/05/libinjection-detect-sql-injection-sqli-and-cross-site-scripting-xss/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2021 05 07 14:49:00 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
Article: Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack - published over 3 years ago. Content: https://www.darknet.org.uk/2021/05/vulhub-pre-built-vulnerable-docker-environments-for-learning-to-hack/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2021 05 27 10:57:54 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
Article: ShellShock payload sample Linux.Bashlet - published about 10 years ago. Content: Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here:MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun...DownloadDownload. Email me if you need the passwordFile InformationFile: fu4k_2485040231A35B7A465361FAF92A512DSize: 152MD5: 2485040231A35B7A465... http://contagiodump.blogspot.com/2014/10/shellshock-payload-sample-linuxbashlet.html Published: 2014 10 02 12:12:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples - published about 10 years ago. Content: PART IIWirelurker for Windows (WinLurker)Research: Palo Alto Claud Xiao: Wirelurker for WindowsSample credit: Claud XiaoPART I Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X MalwarePalo Alto |Claud Xiao - blog post WirelurkerWirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetectorSample credit: Claud XiaoDownloadDow... http://contagiodump.blogspot.com/2014/11/wirelurker-for-osx-ios-part-i-and.html Published: 2014 11 07 01:57:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: OnionDuke samples - published about 10 years ago. Content: Research: F-Secure: OnionDuke: APT Attacks Via the Tor NetworkDownloadDownload. Email me if you need the password (new link)File attributesSize: 219136MD5: 28F96A57FA5FF663926E9BAD51A1D0CBSize: 126464MD5: C8EB6040FD02D77660D19057A38FF769Size: 316928MD5: D1CE79089578DA2D41F1AD901F7B1014Virustotal infohttps://www.virustotal.com/en/file/366affd094cc63e2c19c... http://contagiodump.blogspot.com/2014/11/onionduke-samples.html Published: 2014 11 16 03:58:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: AlienSpy Java RAT samples and traffic information - published about 10 years ago. Content: AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014.It appears to be used in the same campaigns as was Unrccom/Adwind - see the references. If C2 responds, the java RAT downloads Jar files containing Windows Pony/Ponik loader. The RAT is crossplatform and insta... http://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html Published: 2014 11 17 21:16:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: Video archives of security conferences and workshops - published almost 10 years ago. Content: Just some links for your enjoymentList of security conferences in 2014Video archives:AIDE (Appalachian Institute of Digital Evidence)201320122011Blackhat2012 or 2012 torrentBotconf2013BsidesBSides DC 2014BSides Chicago 2014BSides Nashville 2014BSides Augusta 2014BSides Huntsville 2014BSides Las Vegas 2014BSidesDE 2013BSidesLV 2013BSidesRI 2013Bsides Clevelan... http://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html Published: 2015 01 05 04:11:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Equation samples - from the Kaspersky Report and additional - published almost 10 years ago. Content: Here are a few samples from the report by Kaspersky Lab "Equation: The Death Star of Malware Galaxy" and additional samples of the same family. The full list is belowDownload all the samples listed below. Email me if you need the password (New link)List of filesFiles from the report:File NameMD5Size_SD_IP_CF.dll_03718676311DE33DD0B8F4F18CFFD48803718676311de3... http://contagiodump.blogspot.com/2015/02/equation-samples-from-kaspersky-report.html Published: 2015 02 17 06:22:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Collection of Pcap files from malware analysis - published almost 10 years ago. Content: Update: Feb 19. 2015We have been adding pcaps to the collection so remember to check out the folder ( Pcap collection) for the recent pcaps.I had a project to test some malicious and exploit pcaps and collected a lot of them (almost 1000) from various public sources. You can see them in the PUBLIC folder. The credits go to the authors of the pcaps listed in ... http://contagiodump.blogspot.com/2013/04/collection-of-pcap-files-from-malware.html Published: 2015 02 20 04:39:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: Ask and you shall receive - published over 9 years ago. Content: I get emails from readers asking for specific malware samples and thought I would make a mini post about it.Yes, I often obtain samples from various sources for my own research. I am sometimes too lazy/busy to post them but don't mind sharing.If you are looking for a particular sample, feel free to ask. I might have it.Send MD5 (several or few samples). I ca... http://contagiodump.blogspot.com/2015/03/ask-and-you-shall-receive.html Published: 2015 03 09 01:08:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: An Overview of Exploit Packs (Update 25) May 2015 - published over 9 years ago. Content: Update May 12, 2015Added CVE-2015-0359 and updates for CVE-2015-0336 Exploit kit table 2014- 2015 (Sortable HTML table)Reference table : Exploit References 2014-2015Update March 20, 2015Added CVE-2015-0336------------------------Update February 19, 2015Added Hanjuan Exploit kit and CVE-2015-3013 for Angler Update January 24, 2015 http://www.kahusecurity.comA... http://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html Published: 2015 05 12 04:30:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Potao Express samples - published over 9 years ago. Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdfTL; DR2011- July 2015Aka Sapotao and node69Group - Sandworm / Quedagh APTVectors - USB, exe as doc, xlsVictims - RU, BY, AM, GE Victims - MMM group, UA govtruecryptrussia.ru has been serving modified v... http://contagiodump.blogspot.com/2015/08/potao-express-samples.html Published: 2015 08 12 12:24:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: Files download information - published almost 9 years ago. Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account.It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with Google and... http://contagiodump.blogspot.com/2016/02/files-download-information.html Published: 2016 02 23 20:48:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Ransomware.OSX.KeRanger samples - published over 8 years ago. Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud XiaoSample credit: Claud XiaoFile informationd1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1 1d6297e2427f1d00a5b355d6d50809cb Transmission-2.90.dmge3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574 56b1d956112b0b7bd3e44f20cf1f2c19 ... http://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html Published: 2016 03 06 23:39:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: "i am lady" Linux.Lady trojan samples - published over 8 years ago. Content: Bitcoin mining malware for Linux servers - samplesResearch: Dr. Web. Linux.LadySample Credit: Tim StrazzereMD5 list:0DE8BCA756744F7F2BDB732E3267C3F455952F4F41A184503C467141B6171BA786AC68E5B09D1C4B157193BB6CB34007E2CACA9626ED93C3D137FDF494FDAE7CE9423E072AD5A31A80A31FC1F525D614Download. Email me if you need the password.... http://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html Published: 2016 08 17 04:06:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: Linux.Agent malware sample - data stealer - published over 8 years ago. Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight?Sample credit: Tim StrazzereList of files9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65 malwared507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c malwarefddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c script.decompiled-prettyec5d4f90c91273b3794814be... http://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html Published: 2016 08 24 04:18:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Part I. Russian APT - APT28 collection of samples including OSX XAgent - published almost 8 years ago. Content: This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart's content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that "400 lb hacker" or nail another country altogether. You can also have fun and exercise your malware analysis skills without any political agenda.The post contains malwar... http://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html Published: 2017 02 21 02:23:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: DeepEnd Research: Analysis of Trump's secret server story - published over 7 years ago. Content: We posted our take on the Trump's server story. If you have any feedback or corrections, send me an email (see my blog profile on Contagio or DeepEnd Research)Analysis of Trump's secret server story...... http://contagiodump.blogspot.com/2017/03/deepend-research-analysis-of-trumps.html Published: 2017 03 20 04:28:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: Part II. APT29 Russian APT including Fancy Bear - published over 7 years ago. Content: This is the second part of Russian APT series."APT29 - The Dukes Cozy Bear: APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008.1210 This group reportedly compromised the Democratic National Committee starting in the summer of 2015" (src. Mitre ATT&CK)Please see the first post here: Russian APT -... http://contagiodump.blogspot.com/2017/03/part-ii-apt29-russian-apt-including.html Published: 2017 03 31 06:02:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: DDE Command Execution malware samples - published about 7 years ago. Content: Here are a few samples related to the recent DDE Command executionReading:10/18/2017 InQuest/yara-rules 10/18/2017 https://twitter.com/i/moments/918126999738175489 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inquest: Microsoft Office DDE Vortex Ransomware Targeting Poland10/16/2017 https://twitter.com/noottra... http://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html Published: 2017 10 18 06:24:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor