home
-
all
|
technology
-
piracy
-
linux
-
memes
-
asklemmy
-
selfhosted
-
world
-
nostupidquestions
-
mildlyinfuriating
-
games
-
privacy
-
youshouldknow
-
technology
-
technology
-
opensource
-
programmerhumor
-
worldnews
-
showerthoughts
-
fediverse
-
asklemmy
-
more »
log in
or
sign up
|
settings
[email protected]
hot
active
old
new
most comments
new comments
top
show images
listing:
all
-
local
26
1
Khashoggi’s widow sues Israeli firm over spyware she says ruined her life - In the lawsuit, Hanan Elatr says Saudi Arabia used NSO’s Pegasus spyware to track her and her husband’s whereabouts
(archive.ph)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
27
1
China calls hacking report 'far-fetched' and accuses the US of targeting the cybersecurity industry
(apnews.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
28
1
Swing VPN app is a DDOS botnet
(lecromee.github.io)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
29
1
The Nightmare of Proc Hollow’s Exe
(www.trustedsec.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
30
1
Case Study: cracking a global Adversary-In-The-Middle campaign using a threat intelligence toolkit
(blog.sygnia.co)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
31
1
Automating acquisition for incident response
(falconforce.nl)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
32
1
Security Threat Insights Report Q1 2023 - notable malware campaigns, trends and techniques identified from customer telemetry in calendar Q1 2023
(threatresearch.ext.hp.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
33
1
Shampoo: A New ChromeLoader Campaign
(threatresearch.ext.hp.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
34
1
OnlyDcRatFans: Malware Distributed Using Explicit Lures of OnlyFans Pages and Other Adult Content
(www.esentire.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
35
1
Cyber attack by group UAC-0057 (GhostWriter) against the state organization of Ukraine using PicassoLoader and Cobalt Strike Beacon (CERT-UA#6852) - use Chrome translate
(cert.gov.ua)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
36
1
Evasive File Smuggling with Skyhook
(www.blackhillsinfosec.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
37
1
Threat activity and vulnerabilities in Indonesia, Malaysia, Philippines, and Thailand | APNIC Blog
(blog.apnic.net)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
38
1
Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine
(symantec-enterprise-blogs.security.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
39
1
Hijacking S3 Buckets: New Attack Technique
(checkmarx.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
40
1
Russian National Arrested and Charged with Conspiring to Commit LockBit Ransomware Attacks Against U.S. and Foreign Businesses
(www.justice.gov)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
41
1
Video-Based Cryptanalysis: Exploiting a Video Camera's Rolling Shutter to Recover Secret Keys from Devices Using Video of Their Power LED - demonstrate the application of video-based cryptanalysis by
(www.nassiben.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
42
1
한글 문서 파일을 위장한 악성코드(Kimsuky) - Malicious code disguised as a Hangul document file (Kimsuky)
(asec-ahnlab-com.translate.goog)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
43
1
다양한 주제를 이용하여 CHM 악성코드를 유포 중인 Kimsuky - Kimsuky spreading CHM malware using various topics
(asec-ahnlab-com.translate.goog)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
44
1
BypassAV: This map lists the essential techniques to bypass anti-virus and EDR
(github.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
45
1
RunInSandbox: a quick way to run/extract files in Windows Sandbox with a right-click on a file
(www.systanddeploy.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
46
1
PoCs to help learning how to get SYSTEM privilege on Windows
(github.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
47
1
Microsoft Response to Layer 7 Distributed Denial of Service (DDoS) Attacks
(msrc.microsoft.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
48
1
ransomware-descendants: A repository dedicated to tracking ransomware families based on leaked builders.
(github.com)
submitted
2 years ago
by
[email protected]
to
c/
[email protected]
0 comments
fedilink
BlueTeamSec
1 readers
0 users here now
For [Blue|Purple] Teams in Cyber Defence
founded 2 years ago
MODERATORS
[email protected]