digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoBluepurple Pulse: week ending June 25thplus-squarebluepurple.binaryfirefly.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBluepurple Pulse: week ending June 25thplus-squarebluepurple.binaryfirefly.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoBeyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drivesplus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBeyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drivesplus-squareresearch.checkpoint.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoGraphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministriesplus-squaresymantec-enterprise-blogs.security.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGraphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministriesplus-squaresymantec-enterprise-blogs.security.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoUnpacking RDStealer: An Exfiltration Malware Targeting RDP Workloadsplus-squarewww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnpacking RDStealer: An Exfiltration Malware Targeting RDP Workloadsplus-squarewww.bitdefender.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoBlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activitiesplus-squarewww.recordedfuture.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activitiesplus-squarewww.recordedfuture.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoTracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examinationplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examinationplus-squaremedium.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoCID Lookout: Unsolicited Smartwatches Received by Mailplus-squarewww.cid.army.milexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCID Lookout: Unsolicited Smartwatches Received by Mailplus-squarewww.cid.army.mildigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agowin32-app-isolation: Tools and documentation for Win32 app isolationplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkwin32-app-isolation: Tools and documentation for Win32 app isolationplus-squaregithub.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoopenfire鉴权绕过漏洞原理解析 - Openfire Authentication Bypass Vulnerability Principle Analysisplus-squaremp-weixin-qq-com.translate.googexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkopenfire鉴权绕过漏洞原理解析 - Openfire Authentication Bypass Vulnerability Principle Analysisplus-squaremp-weixin-qq-com.translate.googdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoKorean reporting on the Lazarus fake recruiter campaign implantdownload.hauri.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKorean reporting on the Lazarus fake recruiter campaign implantdownload.hauri.netdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years ago한국내 macOS 이용자를 노린 APT37 공격 등장 - APT37 attack targeting macOS users in Koreawww.genians.co.krexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link한국내 macOS 이용자를 노린 APT37 공격 등장 - APT37 attack targeting macOS users in Koreawww.genians.co.krdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoInside of the WASP's nest: deep dive into PyPI-hosted malwareplus-squareblog.virustotal.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInside of the WASP's nest: deep dive into PyPI-hosted malwareplus-squareblog.virustotal.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoUncovering a New Activity Group Targeting Governments in the Middle East and Africa - Palo Alto Networks Blogplus-squarewww.paloaltonetworks.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUncovering a New Activity Group Targeting Governments in the Middle East and Africa - Palo Alto Networks Blogplus-squarewww.paloaltonetworks.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoResident Campaignplus-squarewww.esentire.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResident Campaignplus-squarewww.esentire.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoThe Experience of Cybercrime in Georgia: Awareness, Victimisation and Reportingplus-squarerusi.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Experience of Cybercrime in Georgia: Awareness, Victimisation and Reportingplus-squarerusi.orgdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoFragments of Cross-Platform Backdoor Hint at Larger Mac OS Attackplus-squarebitdefender.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFragments of Cross-Platform Backdoor Hint at Larger Mac OS Attackplus-squarebitdefender.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoDoNot APT Elevates its Tactics by Deploying Malicious Android Apps on Google Play Storeplus-squarewww.cyfirma.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDoNot APT Elevates its Tactics by Deploying Malicious Android Apps on Google Play Storeplus-squarewww.cyfirma.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoKhashoggi’s widow sues Israeli firm over spyware she says ruined her life - In the lawsuit, Hanan Elatr says Saudi Arabia used NSO’s Pegasus spyware to track her and her husband’s whereaboutsplus-squarearchive.phexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKhashoggi’s widow sues Israeli firm over spyware she says ruined her life - In the lawsuit, Hanan Elatr says Saudi Arabia used NSO’s Pegasus spyware to track her and her husband’s whereaboutsplus-squarearchive.phdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoChina calls hacking report 'far-fetched' and accuses the US of targeting the cybersecurity industryplus-squareapnews.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkChina calls hacking report 'far-fetched' and accuses the US of targeting the cybersecurity industryplus-squareapnews.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink
digicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agoThe Nightmare of Proc Hollow’s Exeplus-squarewww.trustedsec.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Nightmare of Proc Hollow’s Exeplus-squarewww.trustedsec.comdigicat@infosec.pubM to BlueTeamSec@infosec.pubEnglish · 2 years agomessage-square0fedilink