APT37: Final1stspy Reaping the FreeMilk
https://ift.tt/2Rht8ml
Submitted October 03, 2018 at 11:37PM by 0xbaadf00dsec
via reddit https://ift.tt/2zOrFgC
https://ift.tt/2Rht8ml
Submitted October 03, 2018 at 11:37PM by 0xbaadf00dsec
via reddit https://ift.tt/2zOrFgC
Intezer
APT37: Final1stspy Reaping the FreeMilk - Intezer
Researchers at Palo Alto Networks recently published a report regarding the NOKKI malware, which has shared code with KONNI and, although not in the report by Palo Alto, KimJongRAT (discovered by Paul Rascagnères of Cisco Talos in 2013), and another report…
How the OODA Loop Can Help Improve Detection Speed and Accuracy - Red Canary
https://ift.tt/2xWAbJ4
Submitted October 04, 2018 at 01:30AM by fireh7nter
via reddit https://ift.tt/2OubLAb
https://ift.tt/2xWAbJ4
Submitted October 04, 2018 at 01:30AM by fireh7nter
via reddit https://ift.tt/2OubLAb
Red Canary
How the OODA Loop Can Help Improve Detection Speed and Accuracy - Red Canary
This post will walk through a malware infection that used PsExec and show how the OODA loop method can help improve detection speed and accuracy.
Open Source FIDO2/U2F Security key
https://ift.tt/2NcgAhF
Submitted October 04, 2018 at 05:30AM by reddigineer
via reddit https://ift.tt/2RmrlMN
https://ift.tt/2NcgAhF
Submitted October 04, 2018 at 05:30AM by reddigineer
via reddit https://ift.tt/2RmrlMN
GitHub
SoloKeysSec/solo
FIDO2 USB+NFC token optimized for security, extensibility, and style - SoloKeysSec/solo
Violating Your Personal Space with Webex - Access all the Meeting Rooms!
https://ift.tt/2O0v8kS
Submitted October 04, 2018 at 04:18AM by ok_bye_now_
via reddit https://ift.tt/2yd5UFe
https://ift.tt/2O0v8kS
Submitted October 04, 2018 at 04:18AM by ok_bye_now_
via reddit https://ift.tt/2yd5UFe
JP
Violating Your Personal Space with Webex
Some time ago Karl Fosaaen with NetSpi came out with some pretty interesting research around Federated Services and Skype for Business. One of the attack vectors was being able to access other comp…
APT38: Details on New North Korean Regime-Backed Threat Group « APT38: Details on New North Korean Regime-Backed Threat Group
https://ift.tt/2xWhKnC
Submitted October 04, 2018 at 01:39PM by fireh7nter
via reddit https://ift.tt/2O54OWS
https://ift.tt/2xWhKnC
Submitted October 04, 2018 at 01:39PM by fireh7nter
via reddit https://ift.tt/2O54OWS
FireEye
APT38: Details on New North Korean Regime-Backed Threat Group « APT38: Details on New North Korean Regime-Backed Threat Group
We release details on APT38, a threat group we believe is responsible for conducting financial crime on behalf of the North Korean regime, stealing millions of dollars from banks worldwide.
CVE-2018-1788: PRTG Network Monitor Privilege Escalation
https://ift.tt/2ybFUdp
Submitted October 04, 2018 at 03:12PM by GetOffMyWAN
via reddit https://ift.tt/2OzeoAM
https://ift.tt/2ybFUdp
Submitted October 04, 2018 at 03:12PM by GetOffMyWAN
via reddit https://ift.tt/2OzeoAM
Criticalstart
PRTG Network Monitor Privilege Escalation | Critical Start
Common Sense Cybersecurity
How China Used a Tiny Chip to Infiltrate Amazon and Appl
https://ift.tt/2RpSgYc
Submitted October 04, 2018 at 03:12PM by singaporeslin9
via reddit https://ift.tt/2NqHm1a
https://ift.tt/2RpSgYc
Submitted October 04, 2018 at 03:12PM by singaporeslin9
via reddit https://ift.tt/2NqHm1a
Bloomberg
China Used a Tiny Chip in a Hack That Infiltrated U.S. Companies
The attack by Chinese spies reached almost 30 U.S. companies by compromising America's technology supply chain.
Hypervisor security advice
https://ift.tt/2xZ8Fuy
Submitted October 04, 2018 at 04:37PM by cromagdk
via reddit https://ift.tt/2yey2I4
https://ift.tt/2xZ8Fuy
Submitted October 04, 2018 at 04:37PM by cromagdk
via reddit https://ift.tt/2yey2I4
reddit
Hypervisor security advice • r/sysadmin
I am looking for some advice. The goal is to gain a bit of knowledge about hypervisor layer security, as in av/ips/something and remain agentless...
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies
https://ift.tt/2RpSgYc
Submitted October 04, 2018 at 05:14PM by scottdeto
via reddit https://ift.tt/2P5hfOK
https://ift.tt/2RpSgYc
Submitted October 04, 2018 at 05:14PM by scottdeto
via reddit https://ift.tt/2P5hfOK
Bloomberg
China Used a Tiny Chip in a Hack That Infiltrated U.S. Companies
The attack by Chinese spies reached almost 30 U.S. companies by compromising America's technology supply chain.
Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters
https://ift.tt/2I5Fytc
Submitted October 04, 2018 at 04:46PM by CyberBullets
via reddit https://ift.tt/2NmcSNN
https://ift.tt/2I5Fytc
Submitted October 04, 2018 at 04:46PM by CyberBullets
via reddit https://ift.tt/2NmcSNN
Appsecco
Static Analysis of Client-Side JavaScript for pen testers and bug bounty hunters
JavaScript has become one of the most ubiquitous technologies in the modern web browsers. Applications built using client-side JavaScript…
Apple, Amazon, Supermicro and China refute Bloomberg's Big Hack story.
https://ift.tt/2ID0w2X
Submitted October 04, 2018 at 07:31PM by scottdeto
via reddit https://ift.tt/2Qw6llz
https://ift.tt/2ID0w2X
Submitted October 04, 2018 at 07:31PM by scottdeto
via reddit https://ift.tt/2Qw6llz
Bloomberg.com
The Big Hack: Statements From Amazon, Apple, Supermicro, and the Chinese Government
Complete text
BYOB (Build Your Own Botnet) v0.2 Released - Major Improvements & Bug Fixes
https://ift.tt/2o2lJKj
Submitted October 04, 2018 at 09:36PM by PoonSafari
via reddit https://ift.tt/2NpJtlA
https://ift.tt/2o2lJKj
Submitted October 04, 2018 at 09:36PM by PoonSafari
via reddit https://ift.tt/2NpJtlA
GitHub
GitHub - malwaredllc/byob: An open-source post-exploitation framework for students, researchers and developers.
An open-source post-exploitation framework for students, researchers and developers. - GitHub - malwaredllc/byob: An open-source post-exploitation framework for students, researchers and developers.
Convert nmap scans into Beautiful HTML web pages
https://ift.tt/2PaWvFr
Submitted October 05, 2018 at 01:20AM by i_rsX
via reddit https://ift.tt/2IFjnKK
https://ift.tt/2PaWvFr
Submitted October 05, 2018 at 01:20AM by i_rsX
via reddit https://ift.tt/2IFjnKK
Member's Area
Convert nmap Scans into Beautiful HTML Pages
A few weeks ago I discovered this neat little trick that helps you see your saved nmap results in HTML formats, locally. This can be very helpful when you are performing large scans, like on an enterprise or a university for example. TL;DR: Use nmap …
[SOLVED] Hostapd error - nl80211: Could not configure driver mode
https://ift.tt/2PdfmQi
Submitted October 05, 2018 at 01:56AM by i_rsX
via reddit https://ift.tt/2zSLqDL
https://ift.tt/2PdfmQi
Submitted October 05, 2018 at 01:56AM by i_rsX
via reddit https://ift.tt/2zSLqDL
Member's Area
Hostapd error - nl80211: Could not configure driver mode
I got this problem when I try to use hostapd on Kali Linux 2018.1 nl80211: Could not configure driver mode I am using TP-link WR722n. Can u give me some suggestion?
Draw.io for threat modeling
https://ift.tt/2QwrNXz
Submitted October 05, 2018 at 01:06PM by michenriksen
via reddit https://ift.tt/2y21WQt
https://ift.tt/2QwrNXz
Submitted October 05, 2018 at 01:06PM by michenriksen
via reddit https://ift.tt/2y21WQt
Debunking "OSINT Analysis of the TOR Foundation" and a few words about Tor's directory authorities
https://ift.tt/2OEshh1
Submitted October 05, 2018 at 03:21PM by jvoisin
via reddit https://ift.tt/2BZxb1u
https://ift.tt/2OEshh1
Submitted October 05, 2018 at 03:21PM by jvoisin
via reddit https://ift.tt/2BZxb1u
dustri.org
Debunking "OSINT Analysis of the TOR Foundation" and a few words about Tor's directory authorities
Personnal blog of Julien (jvoisin) Voisin
Follow up to the container scanning comparison blog
https://ift.tt/2PdjxLG
Submitted October 05, 2018 at 04:55PM by stevenacreman
via reddit https://ift.tt/2yhrdWa
https://ift.tt/2PdjxLG
Submitted October 05, 2018 at 04:55PM by stevenacreman
via reddit https://ift.tt/2yhrdWa
kubedex.com
Follow Up: Container Scanning Comparison - kubedex.com
Come and read Follow Up: Container Scanning Comparison on Kubedex.com. The number one site to Discover, Compare and Share Kubernetes Applications.
"Supposely" GRU using a Pineapple nano (see slide 26)
https://ift.tt/2PcemvB
Submitted October 05, 2018 at 05:21PM by Noth-Noth
via reddit https://ift.tt/2Pf0cKc
https://ift.tt/2PcemvB
Submitted October 05, 2018 at 05:21PM by Noth-Noth
via reddit https://ift.tt/2Pf0cKc
english.defensie.nl
GRU close access cyber operation against OPCW
Press conference cyber, 4 October 2018.
GoogleMeetRoulette: Joining random Google Meet meetings
https://ift.tt/2yf8v1f
Submitted October 05, 2018 at 06:00PM by _yowie_
via reddit https://ift.tt/2y11d1I
https://ift.tt/2yf8v1f
Submitted October 05, 2018 at 06:00PM by _yowie_
via reddit https://ift.tt/2y11d1I
Martin Vigo
GoogleMeetRoulette: Joining random meetings - Martin Vigo
Finding Google Meet phone numbers and bruteforcing PINs to join random meetings
How to Spot Good Fuzzing Research
https://ift.tt/2OIJXbu
Submitted October 05, 2018 at 07:51PM by yossarian_flew_away
via reddit https://ift.tt/2y2ymKK
https://ift.tt/2OIJXbu
Submitted October 05, 2018 at 07:51PM by yossarian_flew_away
via reddit https://ift.tt/2y2ymKK
Trail of Bits Blog
How to Spot Good Fuzzing Research
Of the nearly 200 papers on software fuzzing that have been published in the last three years, most of them—even some from high-impact conferences—are academic clamor. Fuzzing research suffers from…
Hiding malware in Windows – The basics of code injection
https://ift.tt/2DilSU5
Submitted October 05, 2018 at 06:56PM by CyberBullets
via reddit https://ift.tt/2zTOoI5
https://ift.tt/2DilSU5
Submitted October 05, 2018 at 06:56PM by CyberBullets
via reddit https://ift.tt/2zTOoI5
PRDeving
Hiding malware in Windows – The basics of code injection
There are hundreds of teams working professionally trying to break into any single digital device to compromise sensitive data leaving no fingerprint.Malware industry is bigger than you might think…