@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Used by developers for concurrent programming.

https://hastebin.com

🕴🏽 @Phantasm_Lab
Forwarded from Canais e Grupos - TI (Marcel Carvalho)
Forwarded from Canais e Grupos - TI (Marcel Carvalho) via @like
#Evento sobre Criptografia

CryptoFesta Taubaté - Primeira Edição

Data: 18 de novembro (próximo sábado)

Página no Facebook: https://www.facebook.com/events/128222457882150/permalink/131716067532789/

Site: https://encripta.org/cryptofesta/
Forwarded from Security papers
*FBI* has high confidence that *HIDDEN COBRA*

actors are using the IP addresses—listed in this report’s IOC files—to maintain a presence on victims’ networks and to further network exploitation.


DHS and FBI are distributing these *IP addresses* to enable network defense and reduce exposure to any *North Korean government* malicious cyber activity.



This alert includes *IOCs related to HIDDEN COBRA, IP addresses* linked to systems infected with

*FALLCHILL malware*, malware denoscriptions, and associated signatures.


This alert also includes suggested response actions to the IOCs provided, recommended mitigation techniques, and information on reporting incidents. If users or administrators detect activity associated with the *FALLCHILL malware*, they should immediately flag it, report it to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give it the highest priority for enhanced mitigation.

https://www.us-cert.gov/ncas/alerts/TA17-318A

🕴🏽 @Phantasm_Lab