Toggle navigation
TWunroll
TWunroll
faq
Contact US
#Malware
James
agoodfireburns
*endless screaming*https://www.theguardian.com/technology/2021/feb/07/uks-enemies-trying-to-tear-society-apart-via-social-media I wrote a book about this in 2017. 2017. 4 years ago. This is the proper use case for the Die Hard “welcome to
Read more
ESET research
ESETresearch
Last week, #ESETresearch published about latest GMERA campaigns against Mac users. Here is the current campaign: Malware is distributed on iaemr[.]org, registered a month ago. Perpetrators created a fake org.
Read more
Stephen McIntyre
ClimateAudit
Microsoft has technical article on SolarWinds hack. https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/ The few
Read more
Resist the Hologram - Stu Cvrk
STUinSD
Thread – Did the ChiComs Hack the Election?1. Patrick Byrne (founder of overstock-dot-com) has been in the news lately (at least in independent media!), having been present in the White
Read more
passingthehash
passingthehash
keep this in mind....This was likely a multi-year operation with the solar winds thing and we're still not back to the patient zero stage. The bad DLL was signed in
Read more
Mark Arena
markarenaau
It's rare for someone to be experienced as a CTI analyst on both cyber espionage and cybercrime threat types. I see it often that experienced cyber espionage analysts create groups
Read more
Resist the Hologram - Stu Cvrk
STUinSD
The Election Fraud was Anticipated1. Comments courtesy of @Cloudnician: 2. Naturally, the Election Fraud was anticipated. Especially with Dominion Voting Systems caught after the fact in the 2018 election in
Read more
Queen Fennec
Queen_fennec
Earlier today I asked you about these emails. Now let me explain why I did this and give you the answers.https://twitter.com/Queen_fennec/status/1355110715904942083 Let's start with the answers. Both emails were reported
Read more
Furman
furmanism
Security Analyst interview questions.1. What type of Security you use in your Home Network?2. What you know about global information Security policy or Information Security policy in the organisation /
Read more
Andrew Brandt
threatresearch
For your lunchtime* long read this afternoon, I'd like to point you to some work I'm quite proud of that was published today.SophosLabs found what we now suspect may be
Read more
Michael Weiss
michaeldweiss
As @JohnHultquist said, the SVR is still inside many of these computer systems, having built themselves back doors in the event their malware was uncovered and deleted. So Trump's claim
Read more
Tushar
tushar
As you’re aware Australia has recently announced that many of their government websites have been hacked by China. China takes information warfare very very seriously. Much more seriously than any
Read more
‘
1njection
What are some of your favorite methods or articles for detecting process injection techniques?? I’ll start with this bad boy because it’s a great writeup:https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-comm
Read more
Georgia Data Bear, PhD 🇺🇸🍑🏳️🌈 | Jan 5, 2021
dataandpolitics
This is an unprecedented and remarkable opportunity for foreign adversaries to bug politicians’ offices. If you don’t think there are foreign agenda in that crowd — who now have unfettered,
Read more
Costin Raiu
craiu
Looking at possible connections between #Sunburst and #Kazuar, a thread: #SolarWinds #UNC2452 #DarkHalo On Dec 21, 2020, as we were observing the great conjunction between Saturn and Jupiter, one of
Read more
Steve Miller
stvemillertime
A #dailyyara thread on collection of binaries by non-malicious (but threat dense) equities: ELF SOCKS5 edition.I'm an advocate for finding malware and intrusion sets based on "rare equities," files that
Read more
‹
1
2
3
4
5
6
7
8
...
11
12
›
By continuing to use the site, you are consenting to the use of cookies as explained in our
Cookie Policy
to improve your experience.
I agree