Infosec.Pub
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
digicatM to blueteamsecEnglish · 5 months ago

Auto-Color Backdoor: the threat actor had exploited CVE-2025-31324 - Over the course of three days, a threat actor gained access to the customer’s network, attempted to download suspicious files

www.darktrace.com

external-link
message-square
0
link
fedilink
2
external-link

Auto-Color Backdoor: the threat actor had exploited CVE-2025-31324 - Over the course of three days, a threat actor gained access to the customer’s network, attempted to download suspicious files

www.darktrace.com

digicatM to blueteamsecEnglish · 5 months ago
message-square
0
link
fedilink
Auto-Color Backdoor: How Darktrace Thwarted a Stealthy Linux Intrusion
www.darktrace.com
external-link
This blog examines a real-world Auto-Color malware attack that originated from the exploitation of CVE-2025-31324. Learn how Darktrace identified and contained the threat using AI-driven detection and response, with additional support from its expert analyst team.
alert-triangle
You must log in or # to comment.

blueteamsec

blueteamsec

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !blueteamsec@infosec.pub

For [Blue|Purple] Teams in Cyber Defence - covering discovery, detection, response, threat intelligence, malware, offensive tradecraft and tooling, deception, reverse engineering etc.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 28 users / day
  • 90 users / week
  • 217 users / month
  • 815 users / 6 months
  • 217 local subscribers
  • 566 subscribers
  • 1.63K Posts
  • 131 Comments
  • Modlog
  • mods:
  • digicat
  • BE: 0.19.13
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org