SecAtor
Руки-ножницы российского инфосека. Для связи - [email protected]
Show more- Subscribers
- Post coverage
- ER - engagement ratio
Data loading in progress...
Data loading in progress...
Специалисты Threat Intelligence компании F.A.C.C.T. обнаружили pdf-файл с политинформацией о прошедших президентских выборах с модифицированным стилером SapphireStealer . Эту вредоносную программу,...
The Middle East regularly faces attacks from APT groups—cybercriminal groups carrying out multi-stage, carefully planned attacks targeting a specific industry or group of industries. Their objective in the Middle East is to obtain information that can provide political, economic, and military advantages. Some APT groups have also been observed in hacktivist campaigns and operations aimed at sabotage. Positive Technologies has conducted a comprehensive research into the activities of the APT groups targeting organizations in the Middle East. In this article, we will discuss the tactics and techniques, which are commonly used by APT groups in the Middle East, and offer recommendations to strengthen region's protection from sophisticated targeted attacks.
Arena® Simulation Vulnerabilities
The Stable channel has been updated to 123.0.6312.86/.87 for Windows and Mac and 123.0.6312.86 to Linux which will roll out over the coming ...
"Этот проект был частью программы In-App Action Panel (IAPP), которая использовала технологию "перехвата и расшифровки" трафика пользователей в Snapchat, а затем и YouTube и Amazon", - пишут адвокаты в документе.Цукерберг в 2016 поручил специалистам Meta* "раздобыть надёжную аналитику в отношении конкурентов, минуя шифрование". Так родился проект "Охотники за привидениями", в рамках которого появился Onavo VPN для перехвата трафика пользователей. Meta приобрела Onavo у 🇮🇱израильской фирмы более 10 лет назад, обещая пользователям приватный доступ к сети. Однако на деле сервис использовался для шпионажа за конкурирующими приложениями с помощью MITM десятков миллионов людей, которые скачали Onavo. ✒️ Серия скандалов с Meta* [1,2,3,4] продолжает набирать обороты. *Деятельность Meta (соцсети Facebook, Instagram, Threads) запрещена в России как 🏴☠️ экстремистская. ✋ @Russian_OSINT
HUMAN's Satori Threat Intelligence team uncovered a group of 28 apps that turned user devices into residential proxy nodes.
The Oligo research team discovered a live crypto miner campaign targeting a vulnerability in Ray, a widely used open-source AI framework.
Summary The Uniview IPC2322LB processes authentication requests allows remote attackers to bypass the authentication process and gain unauthorized access. If this is combined with a CLI escape, the Uniview device’s security can be completely compromised. Credit Yoseop Kim working for SSD Labs Korea Vendor Response The vendor has released an advisory that addresses this issue: … SSD Advisory – Uniview IPC2322LB Auth Bypass and CLI escape Read More »
Executive Summary The Black Lotus Labs team at Lumen Technologies has identified a multi-year campaign targeting end-of-life (EoL) small home/small office (SOHO) routers and IoT devices, associated with an updated version of “TheMoon” malware. TheMoon, which emerged in 2014, has been operating quietly while growing to over 40,000 bots from 88 countries in January and
We will reveal these treasures to you after authorization. We promise, it's fast!