campuscodiEnglish · 1 year agoFollowing NoName057(16) DDoSia Project’s Targetsplus-squareblog.sekoia.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFollowing NoName057(16) DDoSia Project’s Targetsplus-squareblog.sekoia.iocampuscodiEnglish · 1 year agomessage-square0fedilink
campuscodiEnglish · 1 year agoProcess Mockingjay: Echoing RWX In Userland To Achieve Code Executionplus-squarewww.securityjoes.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkProcess Mockingjay: Echoing RWX In Userland To Achieve Code Executionplus-squarewww.securityjoes.comcampuscodiEnglish · 1 year agomessage-square0fedilink
campuscodiEnglish · 1 year agoThe Enemy Within: Threat Actors Target Subdomains of Trusted Global Brands in Mass Open Redirect Abuse.plus-squarewww.silentpush.comexternal-linkmessage-square2fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkThe Enemy Within: Threat Actors Target Subdomains of Trusted Global Brands in Mass Open Redirect Abuse.plus-squarewww.silentpush.comcampuscodiEnglish · 1 year agomessage-square2fedilink
campuscodiEnglish · 1 year agoDNS Analyzer - Finding DNS vulnerabilities with Burp Suiteplus-squaresec-consult.comexternal-linkmessage-square0fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1external-linkDNS Analyzer - Finding DNS vulnerabilities with Burp Suiteplus-squaresec-consult.comcampuscodiEnglish · 1 year agomessage-square0fedilink
campuscodiEnglish · 1 year agoA technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitationplus-squarecybergeeks.techexternal-linkmessage-square0fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkA technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitationplus-squarecybergeeks.techcampuscodiEnglish · 1 year agomessage-square0fedilink
campuscodiEnglish · 1 year agoResearch: Zero-Day Shopplus-squarewww.cyfirma.comexternal-linkmessage-square1fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkResearch: Zero-Day Shopplus-squarewww.cyfirma.comcampuscodiEnglish · 1 year agomessage-square1fedilink
campuscodiEnglish · 1 year agoConfused about the drama with the new BreachForums? Reading this will either help you or make your head spinplus-squarewww.databreaches.netexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkConfused about the drama with the new BreachForums? Reading this will either help you or make your head spinplus-squarewww.databreaches.netcampuscodiEnglish · 1 year agomessage-square1fedilink
digicatMEnglish · 1 year agoBluepurple Pulse: week ending June 25thplus-squarebluepurple.binaryfirefly.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBluepurple Pulse: week ending June 25thplus-squarebluepurple.binaryfirefly.comdigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agoBeyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drivesplus-squareresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBeyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drivesplus-squareresearch.checkpoint.comdigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agoGraphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministriesplus-squaresymantec-enterprise-blogs.security.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkGraphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministriesplus-squaresymantec-enterprise-blogs.security.comdigicatMEnglish · 1 year agomessage-square0fedilink
udunadanEnglish · 1 year agoDissecting TriangleDB, a Triangulation spyware implantplus-squaresecurelist.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkDissecting TriangleDB, a Triangulation spyware implantplus-squaresecurelist.comudunadanEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agoUnpacking RDStealer: An Exfiltration Malware Targeting RDP Workloadswww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkUnpacking RDStealer: An Exfiltration Malware Targeting RDP Workloadswww.bitdefender.comdigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agoBlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activitieswww.recordedfuture.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkBlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activitieswww.recordedfuture.comdigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agoTracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examinationmedium.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkTracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examinationmedium.comdigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agoCID Lookout: Unsolicited Smartwatches Received by Mailwww.cid.army.milexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkCID Lookout: Unsolicited Smartwatches Received by Mailwww.cid.army.mildigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agowin32-app-isolation: Tools and documentation for Win32 app isolationgithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkwin32-app-isolation: Tools and documentation for Win32 app isolationgithub.comdigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agoopenfire鉴权绕过漏洞原理解析 - Openfire Authentication Bypass Vulnerability Principle Analysismp-weixin-qq-com.translate.googexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkopenfire鉴权绕过漏洞原理解析 - Openfire Authentication Bypass Vulnerability Principle Analysismp-weixin-qq-com.translate.googdigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agoKorean reporting on the Lazarus fake recruiter campaign implantdownload.hauri.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down11
arrow-up10arrow-down1external-linkKorean reporting on the Lazarus fake recruiter campaign implantdownload.hauri.netdigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year ago한국내 macOS 이용자를 노린 APT37 공격 등장 - APT37 attack targeting macOS users in Koreawww.genians.co.krexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link한국내 macOS 이용자를 노린 APT37 공격 등장 - APT37 attack targeting macOS users in Koreawww.genians.co.krdigicatMEnglish · 1 year agomessage-square0fedilink
digicatMEnglish · 1 year agoInside of the WASP's nest: deep dive into PyPI-hosted malwareblog.virustotal.comexternal-linkmessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1external-linkInside of the WASP's nest: deep dive into PyPI-hosted malwareblog.virustotal.comdigicatMEnglish · 1 year agomessage-square0fedilink