cookie

Ми використовуємо файли cookie для покращення вашого досвіду перегляду. Натиснувши «Прийняти все», ви погоджуєтеся на використання файлів cookie.

avatar

Malware News

The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ... Partner channel: @cveNotify Contact: @SirMalware

Більше
Рекламні дописи
6 893
Підписники
+1724 години
+1187 днів
+52130 днів

Триває завантаження даних...

Приріст підписників

Триває завантаження даних...

Disarming DarkGate: A Deep Dive into Thwarting the Latest DarkGate Variant The SonicWall RTDMI ™ engine has recently protected users against the distribution of the “6.6” variant of DarkGate malware by a phishing email campaign containing PDF files as an attachment. DarkGate is an advanced Remote https://blog.sonicwall.com/en-us/2024/07/disarming-darkgate-a-deep-dive-into-thwarting-the-latest-darkgate-variant/ 🎖@malwr
Показати все...
Disarming DarkGate: A Deep Dive into Thwarting the Latest DarkGate Variant

The SonicWall RTDMI ™ engine has recently protected users against the distribution of the “6.6” variant of DarkGate malware by a phishing email campaign containing PDF files as an attachment. DarkGate is an advanced Remote…

A new and improved version of the IAT-Tracer has been released IAT-Tracer is an automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files. https://github.com/YoavLevi/IAT-Tracer 🎖@malwr
Показати все...
GitHub - YoavLevi/IAT-Tracer: An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files.

An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files. - YoavLevi/IAT-Tracer

Показати все...
Fake Microsoft Teams for Mac delivers Atomic Stealer | Malwarebytes

In a new malware campaign, threat actors are using Google ads to target Mac users looking to download Microsoft Teams.

ufrisk/MemProcFS: MemProcFS https://github.com/ufrisk/MemProcFS 🎖@malwr
Показати все...
GitHub - ufrisk/MemProcFS: MemProcFS

MemProcFS. Contribute to ufrisk/MemProcFS development by creating an account on GitHub.

0xjet/ccc: A short graduate course on cybercrime, cyberespionage, and cyberoperations https://github.com/0xjet/ccc 🎖@malwr
Показати все...
GitHub - 0xjet/ccc: A short graduate course on cybercrime, cyberespionage, and cyberoperations

A short graduate course on cybercrime, cyberespionage, and cyberoperations - 0xjet/ccc

DrunkF0x/ADSpider: Monitor changes in Active Directory with replication metadata https://github.com/DrunkF0x/ADSpider 🎖@malwr
Показати все...
GitHub - DrunkF0x/ADSpider: Monitor changes in Active Directory without heavy requests

Monitor changes in Active Directory without heavy requests - DrunkF0x/ADSpider

Noodle RAT Reviewing the Backdoor Used by Chinese-Speaking Groups | Trend Micro (US) This blog entry provides an analysis of the Noodle RAT backdoor, which is likely being used by multiple Chinese-speaking groups engaged in espionage and other types of cybercrime. https://www.trendmicro.com/en_us/research/24/f/noodle-rat-reviewing-the-new-backdoor-used-by-chinese-speaking-g.html 🎖@malwr
Показати все...
Noodle RAT Reviewing the Backdoor Used by Chinese-Speaking Groups

This blog entry provides an analysis of the Noodle RAT backdoor, which is likely being used by multiple Chinese-speaking groups engaged in espionage and other types of cybercrime.

👍 2
Digging for SSRF in NextJS apps At Assetnote, we encounter sites running NextJS extremely often; in this blog post we will detail some common misconfigurations we find in NextJS websites, along with a vulnerability we found in the framework. https://www.assetnote.io/resources/research/digging-for-ssrf-in-nextjs-apps 🎖@malwr
Показати все...
Digging for SSRF in NextJS apps

At Assetnote, we encounter sites running NextJS extremely often; in this blog post we will detail some common misconfigurations we find in NextJS websites, along with a vulnerability we found in the framework.

Crypto Exchange Hacking Basics: Security Vulnerabilities, Testing, and Mitigation | by Harsh Tandel | Jul, 2024 | System Weakness Cryptocurrency exchanges are frequent targets for hackers due to the high value of digital assets they hold. Understanding common security vulnerabilities, knowing how to test them as an ethical… https://systemweakness.com/crypto-exchange-hacking-security-vulnerabilities-testing-and-mitigation-3cf0a3eb683f 🎖@malwr
Показати все...
Crypto Exchange Hacking Basics: Security Vulnerabilities, Testing, and Mitigation

Cryptocurrency exchanges are frequent targets for hackers due to the high value of digital assets they hold. Understanding common security…

1
Tell you phone to link me at the coffee shop - KnifeCoat Tell you phone to link me at the coffee shop - KnifeCoat https://knifecoat.com/Posts/Tell+you+phone+to+link+me+at+the+coffee+shop 🎖@malwr
Показати все...
Tell you phone to link me at the coffee shop - KnifeCoat

Intro As you may be aware I have been doing some hacking on Android recently. Today I want to look into deep links a little bit because there can be many issues that occur when these are not set up a…

Оберіть інший тариф

На вашому тарифі доступна аналітика тільки для 5 каналів. Щоб отримати більше — оберіть інший тариф.