-
Practical
#Malware Analysis Essentials for Incident Responders by@lennyzeltser with a demo of#pestudiohttps://www.youtube.com/watch?v=20xYpxe8mBg … -
2nd Florida city in just one week to pay hackers over $400,000 for computer systems seized in ransomware attack https://buff.ly/2KNjkR9 , via
@CBSNews#MobileSecurity#CyberSecurity#malware pic.twitter.com/AkTOwAGeJ7
-
#Malware [possibly developed by the bank insiders] cashing out ATMs? Meet#ATMJaDi ⇒ https://kas.pr/az4u pic.twitter.com/UT1uZyZZns
-
Obfuscating
#PHP Backdoors Using Legitimate Code Wrappers * Quttera web security blog https://blog.quttera.com/post/backdoor-malware-using-legitimate-code-wrappers …#Malware pic.twitter.com/z0lbIZGIkw
-
Authorities in Bangladesh are investigating hacker attacks against at least three banks in that nation last month. Similar to Cosmos Case. https://www.bankinfosecurity.asia/investigators-probe-attacks-on-at-least-3-bangladesh-banks-a-12690 …
#ATM#Malware#HiddenCobra -
John Snow, King of the North, is trespassing with base64! Not returning to Winterfell afterward, instead heading to hxxp://vemvemserver.duckdns.org:1425 (
#c2). Passes info through user-agent as well With 0 detection (VT 0/56) https://www.virustotal.com/gui/file/c9b6c1ee4b827406bb7829b436e4eea675cf2482f5e84aadece35ffbb43b7885/detection …#malware#scriptletpic.twitter.com/6zHWYCfQwl
-
Mist of
#threats in#cyberaecurity can look as a nice#email to users in your#network.#cyberaware education is key for#security.#cybersec#infosec#cybercrime#cybercriminals#threatintel#osint#darkint#malware#phishing#ransomware#databreach#databreaches#cyberattackspic.twitter.com/9zUXnzlD34
-
Root Kit -The Undetectable Malware https://www.theweborion.com/blog/root-kit-the-undetectable-malware/ …
#ROOTKIT#MALWARE pic.twitter.com/C54ln4PlsK
-
today I received a
#spam email with a html file attached. normally not that interesting but this one caught my attention. it turned out to be#trickbot#malware in the end. made a visualization of the infection stages.. pic.twitter.com/fuNEDW36SN
-
Unpack first stage, analysis second stage of
#icedid#malware with the use of#ghidra /#x32dbg.@malware_traffic@anyrun_app@VK_Intel https://medium.com/@dawid.golak/icedid-aka-bokbot-analysis-with-ghidra-560e3eccb766 …pic.twitter.com/FMDhRaRHjK
-
I’m one of the lucky students that gets to to attend the Malware & Reverse Engineering conference next week!! Super excited! Thanks so much
@ICSLMRE#malware#reverseengineeringhttps://twitter.com/icslmre/status/1143063705023725569 … -
#malware#ursnif Request[.]zip, document/doc https://www.virustotal.com/gui/file/26592e02d920f95dcc7b9bd59439fa1d434498feeb5775cacd3a2043f83ca166/detection … hxxp://zuvwax.com/sp282y/si2s81-19.php?l=nbotil9.pem (had to run the doc to get the exe)https://app.any.run/tasks/46cf9309-51e7-44b6-a914-aafa24e6e8ae …Показать эту ветку -
29
#startups working on the next-generation#cybersecurity >>>@CBinsights via@MikeQuindazzi >>>#cyberattacks#ransomware#cybercrime#malware#ai#iot >>>#Infographics >>> http://bit.ly/2JFI5Lb pic.twitter.com/wjk34I4Q7t
-
A (not recent but) fundamental Tutorial about Windows Executable
#Malware#DFIR http://www.darkblue.ch/programming/PE_Format.pdf … -
Reverse Engineering Malware, Part 3: Getting Started with IDA Pro
#ida#reversing#disassembly#malware#dfir http://bit.ly/2Imv6fF pic.twitter.com/RxJr1FWRiP
-
Wormhole: How to sneak
#malware past#SOC teams by@maniatisVH at#BSidesAth#BSidesAth2019#BSidesAthenspic.twitter.com/JupRt0wzTb
-
2019-06-21:
#Plurox#Malware Backdoor
| Signed
Dig Cert
-> [SEC PARTNERS LIMITED]
#Sectigo "LAUNCHER" in Resource (RCData)
-> LOADER "module32|64.dll"
Anti-VM | Registry Install
| C2 obuhov2k.beget[.]tech
h/t @malwrhunterteam MD5: 40d2986687f7d6004dc455336c645030pic.twitter.com/iDJ931t5J8
-
Living-off-the-land (LotL) part 2 blog is available. Taking a look at real examples from malware I see day to day. Thank you
@anyrun_app for making it easy to search for ATT&CK techniques.#cybersecurity#malware#hacking https://technical.nttsecurity.com/post/102fmgw/living-off-the-land-blog-series-part-2 … -
This is interesting ➤ Here's a new
#malware that first launches#Linux Virtual Machine (VM) on Windows and#macOS systems, and then automatically starts mining software within it... just to take the best of your CPU resources Read more: https://thehackernews.com/2019/06/emulated-malware.html … —by@unix_rootpic.twitter.com/W34IoxqKCx
Загрузка может занять некоторое время.
Вероятно, серверы Твиттера перегружены или в их работе произошел кратковременный сбой. Повторите попытку или посетите страницу Статус Твиттера, чтобы узнать более подробную информацию.