Tweetovi

Blokirali ste korisnika/cu @arieitan

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @arieitan

  1. proslijedio/la je Tweet

    This is an Important thread. The ego and hubris in our industry is unbearable. Startups are hard, innovation is too. Intezer is an amazing product and company. It's easy to release negative videos on YouTube - it's much harder to do the actual work and innovate.

    Poništi
  2. proslijedio/la je Tweet
    prije 6 sati

    Some ppl wondered what I thought of the recent video posted by an infosec celebrity spending 20 mins bashing Intezer :) Here's what I think [thread]

    Prikaži ovu nit
    Poništi
  3. Poništi
  4. proslijedio/la je Tweet
    3. velj

    New variant discovered by with 0 detections in VT. Shares ~95% code with another malicious Dex file 66c053b62231ef5a129d4f07d05d958ed8a998d056a67077d6328ed1c1a99cac

    Poništi
  5. proslijedio/la je Tweet
    30. sij
    Poništi
  6. 30. sij

    Our research team just discovered a new campaign from . Tools were modified, shows that the Iranian government-backed group is doing an effort to evade future detection. Well.. they should try harder. Good job

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    New campaign from . The Iranian-backed group is using an updated toolset tailored to US-based companies to evade detection. Technical analysis by & :

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    New writeup by me and of a new Iranian campaign we discovered! Special thanks to for assisting as well!

    Poništi
  9. proslijedio/la je Tweet
    29. sij

    TA505 seems to be targeting German-speaking countries: "Rechnung" HTML -> XLS -> Get2 Downloader -> ? (was offline, perhaps SDBbot) Example run:

    Poništi
  10. proslijedio/la je Tweet
    28. sij

    We found this Chinese PE malware's ELF version using our Cross-Architecture-Platform (WIN32 -> ELF64) code connection engine. Steals screenshots and waits for further commands from C2. Decodes VBS during runtime

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    We wanted to thank VT user @r3dbU7z for reaching us to share related files to our latest ChinaZ blog. Among the contents of two zip files he sent us we identified every CNC binary of each of the different implants we documented, along with a PHP based DDoS client

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    22. sij

    (aka Group 123 / StarCruft / Reaper) component mentioned in recent 's report shares unique code and strings with the malware uncovered by

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    20. sij

    So.. i think i got it by now: are like the yellow pages of the Malware industry..

    Poništi
  15. proslijedio/la je Tweet
    20. sij

    Our Research Team has recently found newer undetected variants of , a Trojan initially discovered in 2015 with a complex authentication mechanism. Read the technical analysis by

    Poništi
  16. 20. sij

    malware was active 4 years ago and then disappeared. We just discovered it was under the radar for the last years, after changing its tools to stay undetected. Read the technical post by

    Poništi
  17. proslijedio/la je Tweet
    11. sij

    I often hear: 'but, but attackers will use a modified version of my tool to evade the detection method that you've just published' Truth is, 98% of attackers use your tools exactly as you've dropped them.

    Poništi
  18. proslijedio/la je Tweet
    10. sij

    YARA rules for detecting Iranian wipers (Shamoon, ZeroCleare and Dustman)

    Poništi
  19. proslijedio/la je Tweet
    9. sij

    Added YARA rules Github repository to the Awesome-YARA project:

    Poništi
  20. proslijedio/la je Tweet
    9. sij

    Iranian Wipers and share code with samples from 2012. We're releasing a YARA rule (both for x86 and x64 implants) based on the shared binary code of those families -

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·