Forwarded from лінк (т)вінк / link (t)wink =3 (Baka mate)
This media is not supported in your browser
VIEW IN TELEGRAM
🔥3🤯3❤1
Forwarded from Мам, я DPO (K D)
Блін яка прикольна дурня
> Today’s attackers are innovating around traditional security models. Instead of focusing solely on exploiting software vulnerabilities, they’re weaponizing behaviors, noscripting patterns, and even file metadata like filenames to breach systems in stealthy and unexpected ways.
> a real-world, Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file. The payload isn’t hidden inside the file content or a macro, it's encoded directly in the filename itself. Through clever use of shell command injection and base64 encoded Bash payloads, the attacker turns a simple file listing operation into an automatic malware execution trigger
https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/
> Today’s attackers are innovating around traditional security models. Instead of focusing solely on exploiting software vulnerabilities, they’re weaponizing behaviors, noscripting patterns, and even file metadata like filenames to breach systems in stealthy and unexpected ways.
> a real-world, Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file. The payload isn’t hidden inside the file content or a macro, it's encoded directly in the filename itself. Through clever use of shell command injection and base64 encoded Bash payloads, the attacker turns a simple file listing operation into an automatic malware execution trigger
https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/
🥰5