campuscodi@infosec.pubEnglish · 1 year agoFollowing NoName057(16) DDoSia Project’s Targetsblog.sekoia.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkFollowing NoName057(16) DDoSia Project’s Targetsblog.sekoia.iocampuscodi@infosec.pubEnglish · 1 year agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 1 year agoProcess Mockingjay: Echoing RWX In Userland To Achieve Code Executionwww.securityjoes.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkProcess Mockingjay: Echoing RWX In Userland To Achieve Code Executionwww.securityjoes.comcampuscodi@infosec.pubEnglish · 1 year agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 1 year agoThe Enemy Within: Threat Actors Target Subdomains of Trusted Global Brands in Mass Open Redirect Abuse.www.silentpush.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkThe Enemy Within: Threat Actors Target Subdomains of Trusted Global Brands in Mass Open Redirect Abuse.www.silentpush.comcampuscodi@infosec.pubEnglish · 1 year agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 1 year agoDNS Analyzer - Finding DNS vulnerabilities with Burp Suitesec-consult.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDNS Analyzer - Finding DNS vulnerabilities with Burp Suitesec-consult.comcampuscodi@infosec.pubEnglish · 1 year agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 1 year agoA technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitationcybergeeks.techexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkA technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitationcybergeeks.techcampuscodi@infosec.pubEnglish · 1 year agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 1 year agoResearch: Zero-Day Shopwww.cyfirma.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkResearch: Zero-Day Shopwww.cyfirma.comcampuscodi@infosec.pubEnglish · 1 year agomessage-square0fedilink
campuscodi@infosec.pubEnglish · 1 year agoConfused about the drama with the new BreachForums? Reading this will either help you or make your head spinwww.databreaches.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkConfused about the drama with the new BreachForums? Reading this will either help you or make your head spinwww.databreaches.netcampuscodi@infosec.pubEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoBluepurple Pulse: week ending June 25thbluepurple.binaryfirefly.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBluepurple Pulse: week ending June 25thbluepurple.binaryfirefly.comdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoBeyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drivesresearch.checkpoint.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBeyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drivesresearch.checkpoint.comdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoGraphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministriessymantec-enterprise-blogs.security.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGraphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministriessymantec-enterprise-blogs.security.comdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
udunadan@infosec.pubEnglish · 1 year agoDissecting TriangleDB, a Triangulation spyware implantsecurelist.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkDissecting TriangleDB, a Triangulation spyware implantsecurelist.comudunadan@infosec.pubEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoUnpacking RDStealer: An Exfiltration Malware Targeting RDP Workloadswww.bitdefender.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnpacking RDStealer: An Exfiltration Malware Targeting RDP Workloadswww.bitdefender.comdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoBlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activitieswww.recordedfuture.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activitieswww.recordedfuture.comdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoTracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examinationplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examinationplus-squaremedium.comdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoCID Lookout: Unsolicited Smartwatches Received by Mailwww.cid.army.milexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCID Lookout: Unsolicited Smartwatches Received by Mailwww.cid.army.mildigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agowin32-app-isolation: Tools and documentation for Win32 app isolationplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkwin32-app-isolation: Tools and documentation for Win32 app isolationplus-squaregithub.comdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoopenfire鉴权绕过漏洞原理解析 - Openfire Authentication Bypass Vulnerability Principle Analysismp-weixin-qq-com.translate.googexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkopenfire鉴权绕过漏洞原理解析 - Openfire Authentication Bypass Vulnerability Principle Analysismp-weixin-qq-com.translate.googdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoKorean reporting on the Lazarus fake recruiter campaign implantdownload.hauri.netexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKorean reporting on the Lazarus fake recruiter campaign implantdownload.hauri.netdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year ago한국내 macOS 이용자를 노린 APT37 공격 등장 - APT37 attack targeting macOS users in Koreawww.genians.co.krexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-link한국내 macOS 이용자를 노린 APT37 공격 등장 - APT37 attack targeting macOS users in Koreawww.genians.co.krdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink
digicat@infosec.pubMEnglish · 1 year agoInside of the WASP's nest: deep dive into PyPI-hosted malwareblog.virustotal.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkInside of the WASP's nest: deep dive into PyPI-hosted malwareblog.virustotal.comdigicat@infosec.pubMEnglish · 1 year agomessage-square0fedilink