What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
no_ico.webp 2023-12-03 05:21:16 Détecté: vente présumée de CC Sniffer
Detected: Alleged sale of CC Sniffer
(lien direct)
Catégorie: Contenu malveillant: la menace acteur prétend avoir un renifleur CC multifonctionnel et également fournir un accès complet au panel et aux statistiques.Source: OpenWeb Source Link: https://forum.exploit.in/topic/234382/ ACTOR DE MONACE: MARSHALL VICTIVINE UNDEFINE
Category: Malware Content: Threat actor claims to have a multifunctional CC sniffer and also provide full access to the panel and statistics. Source: openweb Source Link: https://forum.exploit.in/topic/234382/ Threat Actor: Marshall Victimology undefined : undefined undefined : undefined undefined : undefined
Malware Threat
no_ico.webp 2023-11-20 12:23:23 La montée des manifestations en temps de guerre
The Rising of Protestware During Times of War
(lien direct)
Dans le paysage en constante évolution des menaces de cybersécurité, un phénomène déconcertant a émergé, ce qui remet en question les notions conventionnelles de logiciel malveillant.Entrez & # 8220; Protestware & # 8221;- Un terme qui envoie des frissons dans les épines des experts en cybersécurité et des individus.Contrairement aux logiciels malveillants traditionnels, Protestware n'est pas conçu dans le seul but d'exploiter les vulnérabilités ou de voler des informations sensibles.Au lieu de cela, c'est [& # 8230;]
In the ever-evolving landscape of cybersecurity threats, a disconcerting phenomenon has emerged, challenging the conventional notions of malicious software. Enter “protestware” - a term that sends shivers down the spines of cybersecurity experts and individuals alike. Unlike traditional malware, protestware isn’t designed with the sole purpose of exploiting vulnerabilities or stealing sensitive information. Instead, it […]
Malware Vulnerability ★★★
no_ico.webp 2023-09-23 04:25:54 Emplacements de persistance de logiciels malveillants: Windows et Linux
Malware Persistence Locations: Windows and Linux
(lien direct)
La persistance des logiciels malveillants est un aspect crucial des cyber-menaces qui passe souvent inaperçue par les utilisateurs sans méfiance.Dans le domaine de la cybersécurité, il fait référence à la capacité des logiciels malveillants à établir un pied sur un système ciblé, lui permettant de maintenir sa présence sur une période prolongée.Cette persistance est réalisée grâce à diverses techniques secrètes, [& # 8230;]
Malware persistence is a crucial aspect of cyber threats that often goes unnoticed by unsuspecting users. In the realm of cybersecurity, it refers to the ability of malicious software to establish a foothold on a targeted system, allowing it to maintain its presence over an extended period. This persistence is achieved through various covert techniques, […]
Malware ★★★★
no_ico.webp 2023-05-25 12:41:14 MALWORIAL POLYMORPHIQUE Utilisation de #AI
Polymorphic Malware Using #AI
(lien direct)
Dans le paysage en constante évolution de la cybersécurité, les acteurs malveillants recherchent constamment de nouvelles façons d'infiltrer les systèmes informatiques, de faire des ravages et d'exploiter les vulnérabilités.L'un de leurs outils les plus insidieux est les logiciels malveillants polymorphes, une menace de changement de forme qui remet en question les mécanismes de défense traditionnels et pose un défi formidable pour les organisations et les individus.Dans cet article de blog, je vais enquêter sur [& # 8230;]
In the ever-evolving landscape of cybersecurity, malicious actors constantly seek new ways to infiltrate computer systems, wreak havoc, and exploit vulnerabilities. One of their most insidious tools is polymorphic malware, a shape-shifting threat that challenges traditional defense mechanisms and poses a formidable challenge to organizations and individuals alike. In this blog post I will investigate […]
Malware Threat ★★★
no_ico.webp 2023-03-02 14:55:30 Malware Families CheatSheet (lien direct) During talks and presentations people often ask me how do I remember so many names, different “artifacts” (a.k.a Malware) and groups. I actually ended up with a “hemmm … well… actually I just remember them since I read and write a lot about cyber threats”. So here it comes the Malware Family CheatSheet. This work […] Malware ★★★
no_ico.webp 2023-02-04 08:17:56 Onenote Malware: Classification and Personal Notes (lien direct) During the past 4 months Microsoft Onenote file format has been (ab)used as Malware carrier by different criminal groups. While the main infection vector is still on eMail side – so nothing really relevant to write on – the used techniques, the templates and the implemented code to inoculate Malware changed a lot. So it […] Malware ★★★
no_ico.webp 2022-08-23 07:12:22 Windows System Calls For Hunters (lien direct) Introduction System calls are the ultimate high-level atomic actions that Malware writers might control. System calls sequences are the defacto ultimate way to divide behaviors between good and bad. For example the system call “encrypt” could be used by a privacy oriented software to encrypt content before shipping-it to a cloud storage or it could […] Malware ★★★
no_ico.webp 2022-05-10 08:18:05 A Malware Analysis in RU-AU conflict (lien direct) Introduction We are living difficult times. From pandemic to Russia-Ukraine war. I was tempt to let a white post for remembering such a devastating times in my personal web corner, but I came out with the idea to remember these times by analyzing an involved sample in current cyber-conflicts. I start looking for Malware and […] Malware ★★★
no_ico.webp 2021-06-14 06:05:41 The Allegedly Ryuk Ransomware builder: #RyukJoke (lien direct) Reverse Engineering is one of the most clear path to study Malware and Threat Attribution, by RE you are intimately observe in the developer mind figuring out techniques and, from time to time, even intents. My current role as a CEO of a mid-sized organization (thousands of people) tries to keep me away from RE, […] Ransomware Malware Threat ★★★
no_ico.webp 2021-03-15 10:40:59 Malware Family Surface 2021 (Q1) (lien direct) After serveral months (actually 15) from the Cybersecurity Observatory launch (you can find it HERE) I experienced a huge increment of classified Malware from the end of January 2021. The following picture shows how the average samples frequency is just more than twice if compared to the beginning of the month and to the past […] Malware
no_ico.webp 2021-03-08 18:00:42 0-Day Malware (2021) (lien direct) Today Yoroi released its last cybersecurity report (available HERE). Following I am copying one of its chapters to give you a little flawor about what you can get for free by downloading it ! Hope you might like its contents. The volume of the malicious code produced and disseminated in the wild is constantly increasing. […] Malware ★★★★
no_ico.webp 2020-12-08 08:36:13 Malware Delivery Platforms in 2020 (lien direct) Once upon a time the Malware, the main actor in the entire infection chain. A single file, once executed it was able to perform the tasks it was designed for, forcing the target machine into victim by taking control or simply execuritying desired (sometime priviledged) commands. In 2010, during my PhD studies, I was already […] Malware
no_ico.webp 2020-10-09 06:54:42 How To Unpack Malware: Personal Notes (lien direct) Nowadays malware authors use a lot of techniques to hide malicious payloads in order to bypass security products and to make malware analyst life harder and fun. There are many tools that you can use to extract content from malware and there is not a standard process, you can use different tools, different techniques and […] Malware
no_ico.webp 2020-08-24 06:57:52 How to Reverse Office Droppers: Personal Notes (lien direct) According to the Yoroi annual cyber security report (available HERE), to Cyber Threat Trends (available HERE) and to many additional resources, Microsoft Office files (Word documents and Excel spreadsheet) are one of the most used malware loaders in the current era. Attackers lure victims, by seducing them to open a specially crafted Office document, which […] Malware Threat
Last update at: 2024-05-19 17:08:07
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter