Seongsu Park

@unpacker

Kaspersky GReAT Senior Security Researcher focused on APAC. Tweets are my own.

404 Notfound
Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @unpacker

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @unpacker

  1. 30. sij

    This comprehensive TA505 report is epic. Shout out to . English version coming soon. Stay tuned!

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    discovery of the day: you can apply structure offsets to a selection of code 🤯 select code range, press T, select your structure, be amazed

    Poništi
  3. 25. sij

    [Securelist] Shlayer Trojan attacks one in ten macOS users

    Poništi
  4. proslijedio/la je Tweet
    20. sij

    New paper: Behind the scenes of GandCrab's operation - The AhnLab Security Analysis Team reveal the full details of the battle that went on between and AhnLab.

    Poništi
  5. proslijedio/la je Tweet
    21. sij
    Poništi
  6. proslijedio/la je Tweet
    21. sij

    Happy to be presenting with at . We will be talking about operation, from Brazil to the world. Hope to see you there!

    Poništi
  7. 19. sij

    Microsoft Warns of Unpatched IE Browser Zero-Day That's Under Active Attacks

    Poništi
  8. 17. sij

    [Talos] JhoneRAT: Cloud based python RAT targeting Middle Eastern countries

    Poništi
  9. proslijedio/la je Tweet
    14. sij

    Of all the things taught me with IDA Pro, this has to be the one that blew my mind the most. Bye bye calc.exe. His training () is full of gems like this.

    Poništi
  10. proslijedio/la je Tweet
    12. sij

    FYI - The Call For Paper (CFP) for Area41 will open on February 14th 2020 and close on Monday April 13th 2020 @ 23:59 CET. We are looking for technical talks in English, so get your ideas ready

    Poništi
  11. 8. sij

    [Securelist] Operation AppleJeus Sequel: Lazarus continues to attack the cryptocurrency business with enhanced capabilities

    Poništi
  12. 6. sij

    [TrendMicro] First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group

    Poništi
  13. 30. pro 2019.
    Prikaži ovu nit
    Poništi
  14. 30. pro 2019.

    Microsoft takes court action against fourth nation-state cybercrime group named Thallium(a.k.a Kimsuky): Indictment document (includes several IOCs):

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    Great example to remember on social media platforms.

    Prikaži ovu nit
    Poništi
  16. 26. pro 2019.

    Highly comprehensive report about Predator malware. Strongly recommend to read this. Let’s play (again) with Predator the thief:

    Poništi
  17. proslijedio/la je Tweet
    25. pro 2019.

    👻 tries to Uninstall anti virus. - Find ESET's ProductCode in 'callback.log' - Uninstall using "/C MSIEXEC /x 'ESET ProductCode' /qb" * signed: Datamingo Limited * hash: 70f42cc9fca43dc1fdfa584b37ecbc81761fb996cb358b6f569d734fa8cce4e3

    Poništi
  18. proslijedio/la je Tweet
    24. pro 2019.

    Attribution by a Chinese vendor surely adds to the table. But their line of argument seems somehow uncommon (I'm using the Google translation). On the one hand the attribution analysis is systematic (C&C logs, language-specific web services, timezones), but...

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    22. pro 2019.

    Yikes! A top iOS app in 's App Store, was a government spy tool!? 🍎📲🕵️‍♂️😱 "...used by the govt. of the United Arab Emirates to try to track every conversation, movement ...of those who install it on their phones" - Our technical analysis:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    17. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·