campuscodi@infosec.pubEnglish · 2 years agoFollowing NoName057(16) DDoSia Project’s Targetsplus-squareblog.sekoia.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFollowing NoName057(16) DDoSia Project’s Targetsplus-squareblog.sekoia.iocampuscodi@infosec.pubEnglish · 2 years agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 2 years agoProcess Mockingjay: Echoing RWX In Userland To Achieve Code Executionwww.securityjoes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkProcess Mockingjay: Echoing RWX In Userland To Achieve Code Executionwww.securityjoes.comcampuscodi@infosec.pubEnglish · 2 years agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 2 years agoThe Enemy Within: Threat Actors Target Subdomains of Trusted Global Brands in Mass Open Redirect Abuse.plus-squarewww.silentpush.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Enemy Within: Threat Actors Target Subdomains of Trusted Global Brands in Mass Open Redirect Abuse.plus-squarewww.silentpush.comcampuscodi@infosec.pubEnglish · 2 years agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 2 years agoDNS Analyzer - Finding DNS vulnerabilities with Burp Suiteplus-squaresec-consult.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDNS Analyzer - Finding DNS vulnerabilities with Burp Suiteplus-squaresec-consult.comcampuscodi@infosec.pubEnglish · 2 years agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 2 years agoA technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitationplus-squarecybergeeks.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitationplus-squarecybergeeks.techcampuscodi@infosec.pubEnglish · 2 years agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 2 years agoResearch: Zero-Day Shopplus-squarewww.cyfirma.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearch: Zero-Day Shopplus-squarewww.cyfirma.comcampuscodi@infosec.pubEnglish · 2 years agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 2 years agoConfused about the drama with the new BreachForums? Reading this will either help you or make your head spinplus-squarewww.databreaches.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConfused about the drama with the new BreachForums? Reading this will either help you or make your head spinplus-squarewww.databreaches.netcampuscodi@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoBluepurple Pulse: week ending June 25thplus-squarebluepurple.binaryfirefly.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBluepurple Pulse: week ending June 25thplus-squarebluepurple.binaryfirefly.comdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoBeyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drivesplus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBeyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drivesplus-squareresearch.checkpoint.comdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoGraphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministriesplus-squaresymantec-enterprise-blogs.security.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGraphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministriesplus-squaresymantec-enterprise-blogs.security.comdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
udunadan@infosec.pubEnglish · 2 years agoDissecting TriangleDB, a Triangulation spyware implantplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDissecting TriangleDB, a Triangulation spyware implantplus-squaresecurelist.comudunadan@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoUnpacking RDStealer: An Exfiltration Malware Targeting RDP Workloadsplus-squarewww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnpacking RDStealer: An Exfiltration Malware Targeting RDP Workloadsplus-squarewww.bitdefender.comdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoBlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activitiesplus-squarewww.recordedfuture.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activitiesplus-squarewww.recordedfuture.comdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoTracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examinationplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examinationplus-squaremedium.comdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoCID Lookout: Unsolicited Smartwatches Received by Mailplus-squarewww.cid.army.milexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCID Lookout: Unsolicited Smartwatches Received by Mailplus-squarewww.cid.army.mildigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agowin32-app-isolation: Tools and documentation for Win32 app isolationplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkwin32-app-isolation: Tools and documentation for Win32 app isolationplus-squaregithub.comdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoopenfire鉴权绕过漏洞原理解析 - Openfire Authentication Bypass Vulnerability Principle Analysisplus-squaremp-weixin-qq-com.translate.googexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkopenfire鉴权绕过漏洞原理解析 - Openfire Authentication Bypass Vulnerability Principle Analysisplus-squaremp-weixin-qq-com.translate.googdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoKorean reporting on the Lazarus fake recruiter campaign implantdownload.hauri.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKorean reporting on the Lazarus fake recruiter campaign implantdownload.hauri.netdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years ago한국내 macOS 이용자를 노린 APT37 공격 등장 - APT37 attack targeting macOS users in Koreawww.genians.co.krexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link한국내 macOS 이용자를 노린 APT37 공격 등장 - APT37 attack targeting macOS users in Koreawww.genians.co.krdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubMEnglish · 2 years agoInside of the WASP's nest: deep dive into PyPI-hosted malwareplus-squareblog.virustotal.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInside of the WASP's nest: deep dive into PyPI-hosted malwareplus-squareblog.virustotal.comdigicat@infosec.pubMEnglish · 2 years agomessage-square0fedilink