New malware is so interesting! If you are reverse-engineering #WikiLoader this blog should help speed up your analysis and reveal a few of the anti-analysis tricks used by the author: proofpoint.com/us/blog/threat…
Here comes a new blog,
In this one I've uncovered a new underground info stealer type malware "KrakenKeylogger".
The blog will cover the Phishing campaign alongside with the execution chain, loader and injection process and overview of the malware capabilities (with some quick…
Cyberchef Tips! - Decoding a Malware Loader using Advanced Cyberchef Tactics.
We'll cover!
- Using regex to identify obfuscated values
- Subsections for isolating obfuscated data
- Regexper.com for visualizing regex queries
- + More 😄
huntress.com/blog/advanced-…
🚨Malware Tips 🚨 - Resolving API Hashes Using Conditional Breakpoints.
By adding breakpoints and log conditions to a function that resolves api hashes, it's possible to quickly resolve api hashes in bulk.
Thread
[1/11] 👇
#Malware#AgentTesla#Ghidra#Debugging
Libraesva LetsDMARC is now available! Without #DMARC, spoofers can steal personally identifiable information (PII) by sending emails that appear to originate from your domain. Learn how to keep your business safe: libraesva.com/letsdmarc/
Today, Abnormal is excited to announce a new partnership with @CrowdStrike that provides a turnkey integration between our two platforms, giving joint customers more comprehensive identity-based protection against email and endpoint attacks.
abnormalsecurity.com/about/news/cro…
Thanks to the awesome work by @DissectMalware, analyzing malicious onenote documents from #qakbot becomes a breeze.
As simple as installing using the below command:
pip install -U github.com/DissectMalware… --force
1/n
It is almost 3 months since where I see Microsoft #onenote used as #Malware carriers. In this research I want to classify the seen Malware and highlights the main adopted techniques in order to quick identification and blocking.
marcoramilli.com/2023/02/04/one…
63 Followers 234 FollowingI am passionate about information security domain. It’s a very challenging and demanding field. With access to information the threats are increasing only.
5K Followers 4K FollowingValueTrader is a tool that provides buy or sell conclusions based on analysis of stock fundamentals such as balance sheet and profit & loss figures.
72K Followers 62K FollowingOfficial handle. Respect sportsmen. Our reverence is reserved for Fans, who make Indian wins, worthwhile. #ISF. Strictly Non Commercial. By the Fans/For Fans.
247 Followers 2K FollowingResearch Student 🌐 @UniRdg_Met @UniofReading @AtmosScience Not active on Twitter, please follow me on BlueSky: https://t.co/zq1SU3BwWI
62K Followers 805 FollowingSecurity Researcher. Previously Google Project Zero and TAG | 0days all day. Love all things bytes, assembly, and glitter. she/her.
93K Followers 3K FollowingJournalist - cyber/national security. Author - COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World's First Digital Weapon. https://t.co/334DzfSL1f
15K Followers 160 FollowingSenior Security Engineer @Amazon. Ex Assistant Professor. Opinions are mine; not my employer's. DM is open.
Author of xlmdeobfuscator and https://t.co/eh1fMHMADE
64K Followers 81 FollowingThe latest research and news from Unit 42, the Palo Alto Networks (@paloaltontwks) Threat Intelligence and Security Consulting Team covering incident response.
60K Followers 1K FollowingSecurity information portal, testing and certification body.
Organisers of the annual Virus Bulletin conference. @[email protected]
75 Followers 79 FollowingLMNTRIX is an Active Defense company specializing in detecting and responding to advanced threats that bypass perimeter controls.
3K Followers 90 FollowingBuilt by MITRE's own ATT&CK® experts, MAD is a hub for defenders to train, take assessments, and get certified on their mastery in the application of ATT&CK.
114K Followers 520 FollowingMITRE ATT&CK® - A knowledge base for describing the behavior of adversaries. Replying/Following/Re-tweeting ≠ endorsement. @ https://t.co/wt46ArkZVt
3K Followers 1 FollowingProject Paused 1/11/22, Tracked Threat Actor Emails in Phishing Kits. CC @PhishKitTracker if you find a #phishingkit , created by @neonprimetime
12K Followers 638 FollowingWe help online companies with content monitoring, penetration testing and brand protection. We aim to make the internet a much safer place for everyone.
318K Followers 75 FollowingKaspersky is the world’s largest privately held vendor of Internet security solutions for businesses and consumers. For support https://t.co/enRPRUIwcm
343K Followers 48 FollowingOne of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.
2K Followers 348 FollowingThe leading AI-native human behavior security platform, leveraging machine learning to protect the cloud office from all email attacks.
285K Followers 3K FollowingTechnology improves our lives and how business is done more than anyone might have imagined. When that technology enables progress, ESET is here to protect it.
4K Followers 774 Followingit security & cyber guy, research @ https://t.co/M5rsSPPPWy, friendly, swiss | Opinions are my own | also https://t.co/v6cAL269P7
18K Followers 95 FollowingNo complexity, just security. We overpower threats and empower IT to cover every stage of an attack, and every size of business.