Tweetovi

Blokirali ste korisnika/cu @mathieutartare

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mathieutartare

  1. proslijedio/la je Tweet

    ESET has released their report on new variants of /, used against two universities in Hongkong.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    31. sij
    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    13. sij

    Un must si vous vous demandez à quoi ça ressemble un stage en reverse engineering chez ESET!

    Poništi
  4. proslijedio/la je Tweet
    2. pro 2019.
    Poništi
  5. proslijedio/la je Tweet
    26. stu 2019.

    After years of relying on click fraud, ad injection, social network fraud and credential stealing, botnet has started to mine . Today, dives deeper into Stantinko's new business model.

    Poništi
  6. proslijedio/la je Tweet
    21. stu 2019.

    Investigating a in Central Europe and the Middle East, discovered a highly unusual downloader. Apart from other nontraditional techniques, the also poses as a default print monitor.

    Poništi
  7. proslijedio/la je Tweet

    I don’t endorse the vocabulary in this tweet but I’d like to share our side of things and perhaps set the records straight. We never really wanted to (and still don’t want to) discredit Dragos publicly, there is really no point. 1/x

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    18. stu 2019.
    Odgovor korisniku/ci

    Yup. Doesn't mean its useless though. The alternative to this handshake agreement / social contract is an NDA. Failure to honor your word gets you kicked out of trust circles and isolated, failure to honor an NDA gets you into court.

    Poništi
  9. proslijedio/la je Tweet
    21. lis 2019.

    For a while now, has been tracking the activities of the . Recently, we discovered a backdoor targeting , allowing attackers to maintain a very discreet foothold inside compromised organizations. -->

    Poništi
  10. proslijedio/la je Tweet
    21. lis 2019.

    skip-2.0 exhibits multiple similarities with other tools from the Group's arsenal: ✅ VMProtected launcher ✅ RC5-encrypted payload with key derived from Volume ID ✅ Custom packer ✅ Inner-Loader injector ✅ hooking procedure 3/3

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    21. lis 2019.

    discovered an undocumented Server backdoor called skip-2.0 and part of the Group's arsenal that allows to bypass normal authentication by using a magic password. 1/3

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    21. lis 2019.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    18. lis 2019.
    Poništi
  14. proslijedio/la je Tweet
    17. lis 2019.

    We found some code similarity between and 4/4

    Poništi
  15. proslijedio/la je Tweet
    17. lis 2019.

    Full paper: As always, IoCs and event are available on our GitHub account: The attackers reused Miniduke that was first described 6 years ago. 3/4

    Poništi
  16. proslijedio/la je Tweet
    17. lis 2019.

    discovered 3 new malware families part of the / arsenal: , and 📌 Twitter, Reddit as C&C 📌 C&C communications in pictures 🎯 3 European MFAs + 1 embassy in Washington, DC 📅 2013 to June 2019 2/4

    Poništi
  17. proslijedio/la je Tweet
    17. lis 2019.

    Despite being implicated in the hack in 2016, the APT group managed to stay under the radar for several years. Yet, as newest uncovers, they never ceased their activities. 1/4

    Poništi
  18. proslijedio/la je Tweet
    14. lis 2019.

    : PortReuse uses techniques similar to the malware, such as waiting for a magic packet and modular architecture, but is a different beast.

    Poništi
  19. proslijedio/la je Tweet
    14. lis 2019.

    : Before you all say it wrong, we pronounce “Win N.T.I”, not “Winn T.I.”. (While we are at it, it’s GIF not JIF.) If you run an online casino and server component is called “GameServer_NewPoker.exe”, you may be compromised by Winnti.

    Poništi
  20. proslijedio/la je Tweet
    14. lis 2019.

    For attackers, changing a string is easy, but changing a whole structure requires more resources. That’s why we try to use the techniques they use to hunt for their arsenal. Sometimes, it works.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·