Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 7 / 20
381 résultats taggé Analysis  ✕
The Hidden Treasures of Crash Reports https://objective-see.org/blog/blog_0x7B.html?mc_cid=cc6f2fb89f&mc_eid=0d9a12074d
15/08/2024 07:06:53
QRCode
archive.org
thumbnail

Sadly, nobody really loves crash reports, but I’m here to change that!

This research, a crash course on crash reports, will highlight how these often overlooked files are an invaluable source of information, capable of revealing malware infections, exploitation attempts, or even buggy (exploitable?) system code. Such insights are critical for defense and offense, empowering us to either protect or exploit macOS systems.

objective-see EN 2024 crash-report course Hidden analysis macos
Ongoing Social Engineering Campaign Refreshes Payloads https://www.rapid7.com/blog/post/2024/08/12/ongoing-social-engineering-campaign-refreshes-payloads/
12/08/2024 16:56:27
QRCode
archive.org
thumbnail

On June 20, 2024, Rapid7 identified multiple intrusion attempts by threat actors utilizing Techniques, Tactics, and Procedures (TTPs) that are consistent with an ongoing social engineering campaign being tracked by Rapid7.

rapid7 EN 2024 TTPs Social-engineering Campaign analysis BlackBasta
Major Payment Disruption: Ransomware Strikes Indian Banking Infrastructure https://www.cloudsek.com/blog/major-payment-disruption-ransomware-strikes-indian-banking-infrastructure
07/08/2024 10:56:43
QRCode
archive.org
thumbnail

CloudSEK's threat research team has uncovered a ransomware attack disrupting India's banking system, targeting banks and payment providers. Initiated through a misconfigured Jenkins server at Brontoo Technology Solutions, the attack is linked to the RansomEXX group.

cloudsek EN ransomware analysis Jenkins India RansomEXX CVE-2024-23897
Quartet of Trouble: XWorm, AsyncRAT, VenomRAT, and… https://www.esentire.com/blog/quartet-of-trouble-xworm-asyncrat-venomrat-and-purelogs-stealer-leverage-trycloudflare
03/08/2024 21:06:45
QRCode
archive.org
thumbnail

Learn more about how four malware, XWorm, AsyncRAT, VenomRAT, and PureLogs Stealer, are leveraging TryCloudflare and get security recommendations from our…

esentire EN 2024 research analysis XWorm AsyncRAT VenomRAT PureLogStealer TryCloudflare
Ransomware ecosystem fragmenting under law enforcement pressure and distrust https://therecord.media/ransomware-ecosystem-changing-under-law-enforcement-pressure-distrust
25/07/2024 09:16:17
QRCode
archive.org
thumbnail

Veteran cybercriminals appear to be reducing their dependence on ransomware-as-a-service platforms — a sign that law enforcement raids are having an impact. Experts say the market for digital extortion tools has plenty of room to adapt, though.

therecord.media EN 2024 analysis ransomware-as-a-service law enforcement pressure
Arctic Wolf Labs has observed Fog ransomware being deployed against US organizations in the education and recreation sectors. https://arcticwolf.com/resources/blog/lost-in-the-fog-a-new-ransomware-threat/
22/07/2024 22:49:16
QRCode
archive.org
thumbnail

On May 2, 2024, Arctic Wolf Labs began monitoring deployment of a new ransomware variant referred to as Fog. The ransomware activity was observed in several Arctic Wolf Incident Response cases, each exhibiting similar elements. All victim organizations were located in the United States, 80% of which were in the education sector and 20% in the recreation sector.

We are sharing details of this emerging variant to help organizations defend against this threat. Please note that we may add further detail to this article as we uncover additional information in our ongoing investigation.

arcticwolf EN 2024 Fog ransomware USA ransomware analysis
Brief technical analysis of the "Poseidon Stealer" malware https://www.ncsc.admin.ch/ncsc/en/home/aktuell/im-fokus/2024/poseidon_bericht.html
17/07/2024 20:57:47
QRCode
archive.org

11.07.2024 - At the end of June 2024, cybercriminals spread the malware "Poseidon Stealer" in German-speaking Switzerland by email, using AGOV as a lure with the aim of infecting computers with the macOS operating system. The NCSC has now produced and published a brief technical analysis of the malware.
#news

NCSC CH EN Switzerland AGOV PoseidonStealer analysis
ClickFix Deception: A Social Engineering Tactic to Deploy Malware https://www.mcafee.com/blogs/other-blogs/mcafee-labs/clickfix-deception-a-social-engineering-tactic-to-deploy-malware/
17/07/2024 10:29:10
QRCode
archive.org
thumbnail

Authored by Yashvi Shah and Vignesh Dhatchanamoorthy McAfee Labs has discovered a highly unusual method of malware delivery, referred to by researchers as

mcafee EN 2024 analysis ClickFix Deploy Malware Tactic
Kematian-Stealer : A Deep Dive into a New Information Stealer https://www.cyfirma.com/research/kematian-stealer-a-deep-dive-into-a-new-information-stealer/
11/07/2024 14:37:16
QRCode
archive.org
thumbnail

Kematian-Stealer is actively being developed and distributed as an open-source tool on GitHub. Our investigation revealed that the stealer’s source code, related scripts, and a builder for generating malicious binaries are hosted under the GitHub account “Somali-Devs.” Significant contributions from the user KDot227 suggest a close link between this account and the development of the stealer. These scripts and stealer are designed to covertly extract sensitive data from unsuspecting users and organizations.

cyfirma EN 2024 Kematian-Stealer open-source stealer analysis
Behind the Attack: Live Chat Phishing https://perception-point.io/blog/behind-the-attack-live-chat-phishing/
11/07/2024 09:51:48
QRCode
archive.org
thumbnail

In this blog, we investigate a phishing attack that leverages the inherent trust we put in live-human-chat support. 

perception-point EN 2024 Live-Chat Phishing analysis
How do cryptocurrency drainer phishing scams work? https://blog.talosintelligence.com/how-do-cryptocurrency-drainer-phishing-scams-work/
11/07/2024 07:20:05
QRCode
archive.org
thumbnail

In recent months, a surge in cryptodrainer phishing attacks has been observed, targeting cryptocurrency holders with sophisticated schemes aimed at tricking them into divulging their valuable credentials.

talosintelligence EN 2024 cryptodrainer phishing attacks analysis
Turla: A Master’s Art of Evasion https://www.gdatasoftware.com/blog/2024/07/37977-turla-evasion-lnk-files
08/07/2024 23:09:49
QRCode
archive.org

Turla, a well-known piece of malware, has taken to weaponising LNK-files to infect computers. We have observed a current example of this.

gdatasoftware EN 2024 Turla analysis malware LNK-files LNK
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
27/06/2024 08:47:39
QRCode
archive.org
thumbnail

P2Pinfect is a rust-based malware covered extensively by Cado Security in the past. Cado Security researchers first discovered it during triage of honeypot telemetry in July of 2023.

cadosecurity EN 2024 P2Pinfect Ransomware analysis
Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806) https://labs.watchtowr.com/auth-bypass-in-un-limited-scenarios-progress-moveit-transfer-cve-2024-5806/
27/06/2024 08:41:16
QRCode
archive.org
thumbnail

Progress un-embargoed an authentication bypass vulnerability in Progress MOVEit Transfer.

Many sysadmins may remember last year’s CVE-2023-34362, a cataclysmic vulnerability in Progress MOVEit Transfer that sent ripples through the industry, claiming such high-profile victims as the BBC and FBI. Sensitive data was leaked, and sensitive data was destroyed, as the cl0p ransomware gang leveraged 0days to steal data - and ultimately leaving a trail of mayhem.

watchtowr.com EN 2024 MOVEit CVE-2024-5806 Analysis PoC
RansomHub Draws in Affiliates with Multi-OS Capability and High Commission Rates https://www.recordedfuture.com/ransomhub-draws-in-affiliates-with-multi-os-capability-and-high-commission-rates
24/06/2024 20:15:50
QRCode
archive.org
thumbnail

Discover how RansomHub's ransomware-as-a-service targets Windows, Linux, and ESXi systems.

recordedfuture EN 2024 analysis RansomHub ESXi Linux Multi-OS
Newly discovered: BadSpace backdoor delivered by high-ranking websites https://www.gdatasoftware.com/blog/2024/06/37947-badspace-backdoor
17/06/2024 13:31:28
QRCode
archive.org

Threat actors deliver fake software updates on websites for popular browsers: Sites with a high search engine ranking are at an increased risk.

gdatasoftware EN 2024 analysis BadSpace backdoor high-ranking websites
You’ve Got Mail: Critical Microsoft Outlook Vulnerability Executes as Email is Opened https://blog.morphisec.com/cve-2024-30103-microsoft-outlook-vulnerability
12/06/2024 16:56:33
QRCode
archive.org
thumbnail

Morphisec researchers have identified a critical Microsoft Outlook vulnerability, CVE-2024-30103, and detail its technical impact and recommended actions.

morphisec EN 2024 CVE-2024-30103 Microsoft Outlook analysis
CVE-2024-29824 Deep Dive: Ivanti EPM SQL Injection Remote Code Execution Vulnerability – Horizon3.ai https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29824-deep-dive-ivanti-epm-sql-injection-remote-code-execution-vulnerability/
12/06/2024 16:55:47
QRCode
archive.org
thumbnail

CVE-2024-29824 Ivanti EPM SQL Injection Remote Code Execution Vulnerability. This blog details the internals of a SQLi RCE vulnerability.

horizon3 EN analysis CVE-2024-29824 Ivanti EPM SQL Injection RCE
IcedID Brings ScreenConnect and CSharp Streamer to ALPHV Ransomware Deployment – The DFIR Report https://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/
11/06/2024 21:34:35
QRCode
archive.org
thumbnail

Key Takeaways In October 2023, we observed an intrusion that began with a spam campaign, distributing a forked IcedID loader. The threat actor used Impacket’s wmiexec and RDP to install Scree…

thedfirreport EN 2024 analysis IceID ScreenConnect incident ALPHV Ransomware
PikaBot: a Guide to its Deep Secrets and Operations - Sekoia.io Blog https://blog.sekoia.io/pikabot-a-guide-to-its-deep-secrets-and-operations/
04/06/2024 11:15:28
QRCode
archive.org
thumbnail

Uncover an in-depth analysis of PikaBot, a malware loader used by Initial Access Brokers for network compromise and ransomware deployment.

sekoia EN 2024 PikaBot malware analysis TA577 BlackBasta
page 7 / 20
4738 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio