cookie

Sizning foydalanuvchi tajribangizni yaxshilash uchun cookie-lardan foydalanamiz. Barchasini qabul qilingΒ», bosing, cookie-lardan foydalanilishiga rozilik bildirishingiz talab qilinadi.

avatar

Malware News

The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ... Partner channel: @cveNotify Contact: @SirMalware

Ko'proq ko'rsatish
Reklama postlari
6 897
Obunachilar
+1724 soatlar
+1187 kunlar
+52130 kunlar

Ma'lumot yuklanmoqda...

Obunachilar o'sish tezligi

Ma'lumot yuklanmoqda...

Disarming DarkGate: A Deep Dive into Thwarting the Latest DarkGate Variant The SonicWall RTDMI β„’ engine has recently protected users against the distribution of the β€œ6.6” variant of DarkGate malware by a phishing email campaign containing PDF files as an attachment. DarkGate is an advanced Remote https://blog.sonicwall.com/en-us/2024/07/disarming-darkgate-a-deep-dive-into-thwarting-the-latest-darkgate-variant/ πŸŽ–@malwr
Hammasini ko'rsatish...
Disarming DarkGate: A Deep Dive into Thwarting the Latest DarkGate Variant

The SonicWall RTDMI β„’ engine has recently protected users against the distribution of the β€œ6.6” variant of DarkGate malware by a phishing email campaign containing PDF files as an attachment. DarkGate is an advanced Remote…

A new and improved version of the IAT-Tracer has been released IAT-Tracer is an automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files. https://github.com/YoavLevi/IAT-Tracer πŸŽ–@malwr
Hammasini ko'rsatish...
GitHub - YoavLevi/IAT-Tracer: An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files.

An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (.tag) files. - YoavLevi/IAT-Tracer

Hammasini ko'rsatish...
Fake Microsoft Teams for Mac delivers Atomic Stealer | Malwarebytes

In a new malware campaign, threat actors are using Google ads to target Mac users looking to download Microsoft Teams.

ufrisk/MemProcFS: MemProcFS https://github.com/ufrisk/MemProcFS πŸŽ–@malwr
Hammasini ko'rsatish...
GitHub - ufrisk/MemProcFS: MemProcFS

MemProcFS. Contribute to ufrisk/MemProcFS development by creating an account on GitHub.

0xjet/ccc: A short graduate course on cybercrime, cyberespionage, and cyberoperations https://github.com/0xjet/ccc πŸŽ–@malwr
Hammasini ko'rsatish...
GitHub - 0xjet/ccc: A short graduate course on cybercrime, cyberespionage, and cyberoperations

A short graduate course on cybercrime, cyberespionage, and cyberoperations - 0xjet/ccc

DrunkF0x/ADSpider: Monitor changes in Active Directory with replication metadata https://github.com/DrunkF0x/ADSpider πŸŽ–@malwr
Hammasini ko'rsatish...
GitHub - DrunkF0x/ADSpider: Monitor changes in Active Directory without heavy requests

Monitor changes in Active Directory without heavy requests - DrunkF0x/ADSpider

Noodle RAT Reviewing the Backdoor Used by Chinese-Speaking Groups | Trend Micro (US) This blog entry provides an analysis of the Noodle RAT backdoor, which is likely being used by multiple Chinese-speaking groups engaged in espionage and other types of cybercrime. https://www.trendmicro.com/en_us/research/24/f/noodle-rat-reviewing-the-new-backdoor-used-by-chinese-speaking-g.html πŸŽ–@malwr
Hammasini ko'rsatish...
Noodle RAT Reviewing the Backdoor Used by Chinese-Speaking Groups

This blog entry provides an analysis of the Noodle RAT backdoor, which is likely being used by multiple Chinese-speaking groups engaged in espionage and other types of cybercrime.

πŸ‘ 2
Digging for SSRF in NextJS apps At Assetnote, we encounter sites running NextJS extremely often; in this blog post we will detail some common misconfigurations we find in NextJS websites, along with a vulnerability we found in the framework. https://www.assetnote.io/resources/research/digging-for-ssrf-in-nextjs-apps πŸŽ–@malwr
Hammasini ko'rsatish...
Digging for SSRF in NextJS apps

At Assetnote, we encounter sites running NextJS extremely often; in this blog post we will detail some common misconfigurations we find in NextJS websites, along with a vulnerability we found in the framework.

Crypto Exchange Hacking Basics: Security Vulnerabilities, Testing, and Mitigation | by Harsh Tandel | Jul, 2024 | System Weakness Cryptocurrency exchanges are frequent targets for hackers due to the high value of digital assets they hold. Understanding common security vulnerabilities, knowing how to test them as an ethical… https://systemweakness.com/crypto-exchange-hacking-security-vulnerabilities-testing-and-mitigation-3cf0a3eb683f πŸŽ–@malwr
Hammasini ko'rsatish...
Crypto Exchange Hacking Basics: Security Vulnerabilities, Testing, and Mitigation

Cryptocurrency exchanges are frequent targets for hackers due to the high value of digital assets they hold. Understanding common security…

❀ 1
Tell you phone to link me at the coffee shop - KnifeCoat Tell you phone to link me at the coffee shop - KnifeCoat https://knifecoat.com/Posts/Tell+you+phone+to+link+me+at+the+coffee+shop πŸŽ–@malwr
Hammasini ko'rsatish...
Tell you phone to link me at the coffee shop - KnifeCoat

Intro As you may be aware I have been doing some hacking on Android recently. Today I want to look into deep links a little bit because there can be many issues that occur when these are not set up a…

Boshqa reja tanlang

Joriy rejangiz faqat 5 ta kanal uchun analitika imkoniyatini beradi. Ko'proq olish uchun, iltimos, boshqa reja tanlang.