Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @thehellu
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @thehellu
-
Prikvačeni tweet
The slides of our
#VB2019 talk are available! https://www.virusbulletin.com/uploads/pdf/conference_slides/2019/VB2019-LunghiHorejsi.pdf … The idea is to give examples of cloud service providers being abused by#APT actors, and how, as defenders, we can leverage it to get more information on such threat actors. Video and paper coming later!pic.twitter.com/75TsN0xIYb
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Je donnerai le même talk au Defcon group Paris jeudi soir au Thirsty Mad Cat, comme ça pas de jaloux :-)https://dc11331.com/next-meetup/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Si vous êtes à Lille pour CorIIN dès ce soir, n'hésitez pas à passer au Dernier Bar avant la fin du monde, je donne une prés sur des groupes utilisant différents services cloud pour des attaques ciblées, et comment en tirer parti en tant que défenseur http://dc11333.org/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Following ti360 and our own
@TrendMicroRSRCH research,@LAB52io wrote new information about the (likely) financially-driven group APT-C-36, targeting mainly South America and particularly Colombia https://lab52.io/blog/apt-c-36-recent-activity-analysis/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to
#SideWinder APT Group https://blog.trendmicro.com/trendlabs-security-intelligence/first-active-attack-exploiting-cve-2019-2215-found-on-google-play-linked-to-sidewinder-apt-group/ …pic.twitter.com/WAJq067kOI
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
Just published : Drilling Deep: A Look at
#cyberattacks on the#Oil and#Gas industry - Hope you'll enjoy ! - https://documents.trendmicro.com/assets/white_papers/wp-drilling-deep-a-look-at-cyberattacks-on-the-oil-and-gas-industry.pdf …#APT33#oilgas#malware#cybercrime#DFIR#energyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
For months we at
@_CPResearch_ and@IntezerLabs mapped and tracked code-connections between thousands of Russian APT samples we classified. Our talk from@hack_lu is now available online
Read the full research here >> https://research.checkpoint.com/russianaptecosystem/ …https://twitter.com/Ministraitor/status/1201830093380825089 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
In
@TrendMicro we take the SOCKS problem seriously. Awesome ! \o/pic.twitter.com/r5wCra8kpZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
Windows
#UAC isn't a favorite feature, but@HexKitchen details a bug submitted by Eduardo Braun Prado that shows how you can use it to escalate from guest to SYSTEM (includes video)http://bit.ly/2QyFQPJHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
Insight into
#APT33 groups VPN network/activities from@TrendMicro's Feike Hacquebord,@cedricpernet & Kenney Lu https://blog.trendmicro.com/trendlabs-security-intelligence/more-than-a-dozen-obfuscated-apt33-botnets-used-for-extreme-narrow-targeting/ … . Also nice summary from@ZDNet with a behind the scenes pre-production quality diagram :) ->https://www.zdnet.com/article/iranian-hacking-group-built-its-own-vpn-network/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
Publication de l'état de la menace liée aux
#botnets par l'équipe#CTI de@ANSSI_FR sur le site Internet du@CERT_FR : finalités, cycles de vie et perspectives. Un état de l'art stratégique du domaine. https://www.cert.ssi.gouv.fr/uploads/CERTFR-2019-CTI-008.pdf …pic.twitter.com/jt4xLzRUzb
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Virus Total updated his sandbox. Some interesting points: - the previous in-house VT sandbox was running Windows XP 1. The new one is Windows 7 - they added JA3 hashes, which might help clustering binaries based on their SSL/TLS initialization fingerprinthttps://twitter.com/virustotal/status/1187311976164265984 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
They also referenced our research on
#Confucius threat actor. The low amount of effort this actor puts into changing their tactics is noticeable by comparing the screenshots in our 2018 research https://blog.trendmicro.com/trendlabs-security-intelligence/confucius-update-new-tools-and-techniques-further-connections-with-patchwork/ … with the Philions screenshot in the BlackBerry researchpic.twitter.com/PSfTS8nKmd
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
BlackBerry research team published a well documented overview of worldwide
#APT groups targeting mobile platform https://threatvector.cylance.com/en_us/home/mobile-malware-and-apt-espionage-prolific-pervasive-and-cross-platform.html …. They add some insight regarding a specific#MuddyWater target based in our recent research. Nice work !pic.twitter.com/w8RygHNvmp
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#Turla started timidly by deploying#Oilrig tools in computers they had previously owned themselves, then scanned IP addresses looking for Oilrig ASPX shells, and ended up fully compromising Oilrig C2 servers to get victims as well as Oilrig operators data https://www.ncsc.gov.uk/news/turla-group-exploits-iran-apt-to-expand-coverage-of-victims …pic.twitter.com/5zpF307lFm
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nice report from ESET about
#APT29 that shows more cloud services providers (Twitter, Reddit, Imgur...) being abused to store C&C server address. Full analysis including encryption and steganography techniques in the paper https://www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
From tweet to rootkit, our analysis by
@Heurs of a signed#Winnti rootkit highlighted by@cyb3rops : [EN] https://exatrack.com/public/winnti_EN.pdf … [FR] https://exatrack.com/public/winnti_FR.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
As people are disclosing how to hunt for free C2s, here are our prez with
@JusticeRage Justice from#SAS2019 related to from tips and tricks. Note that we follow dozens of implants like that since years. It is just few examples.pic.twitter.com/qOz4DM6RFD
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
ANSSI (CERT-FR) gives some ideas on how to detect attacks targeting service providers and design offices. Some of them are quite novel and related to VPN connections, others are more common and related to file paths or registry keys https://www.cert.ssi.gouv.fr/uploads/CERTFR-2019-CTI-005.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Lunghi proslijedio/la je Tweet
I helped provide input to the YARA Performance Guidelines (https://gist.github.com/Neo23x0/e3d4e316d7441d9143c7 …) by
@cyb3rops and I've seen it shared in various places again recently. I'd like to add some updates in this thread...Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.