Forwarded from Sec Note
Analyzing Avast AV: Kernel Hooking and Driver Reverse Engineering
👾Presentation Video
Blog:
https://binary-win.github.io/2025/12/27/AVAST-Kernel-Hooks-and-AV-ANALYSIS.html
👾Presentation Video
Blog:
https://binary-win.github.io/2025/12/27/AVAST-Kernel-Hooks-and-AV-ANALYSIS.html
❤4🔥1
Forwarded from Infosec Fortress (Amir M. Jahangirzad)
media.ccc.de
DNGerousLINK
The spyware attack targeting WhatsApp, disclosed in August as an in-the-wild exploit, garnered significant attention. By simply knowing a...
DNGerousLINK: A Deep Dive into WhatsApp 0-Click Exploits on iOS and Samsung Devices
📹 Video
#exploitation
#whatsapp
#android
#ios
———
🆔 @Infosec_Fortress
📹 Video
#exploitation
#android
#ios
———
🆔 @Infosec_Fortress
❤5👍2
Forwarded from Sec Note
Analyzing CVE‑2025‑0287: From IOCTL Entry to Arbitrary Kernel Memory Write … in driver biontdrv.sys
By meisameb
By meisameb
🔥4❤1
The new wave of attacks on Iranian organizations: the release of infected files through the mirror links of the Soft98 website
https://news.amnpardaz.com/1404/10/17868/%da%a9%d9%85%d9%be%db%8c%d9%86-%d8%ac%d8%af%db%8c%d8%af-%d8%a8%d8%af%d8%a7%d9%81%d8%b2%d8%a7%d8%b1%db%8c-%d8%a7%d8%b3%d8%aa%d9%81%d8%a7%d8%af%d9%87-%d8%a7%d8%b2-soft98-%d8%a8%d9%87%d8%b9/
😁7
Forwarded from RME-DisCo @ UNIZAR [www.reversea.me]
Reverse-engineering the Yamaha DX7 synthesizer's sound chip from die photos http://www.righto.com/2021/11/reverse-engineering-yamaha-dx7.html?m=1
Righto
Reverse-engineering the Yamaha DX7 synthesizer's sound chip from die photos
The Yamaha DX7 digital synthesizer was released in 1983 and became "one of the most important advances in the history of modern popular mu...
👍3
Forwarded from APT IRAN
طبق بررسیهایی که انجام دادیم، از دیروز چندین آیپی از کشور امارات متحده عربی شروع به یک حمله سایبری سازمانیافته علیه سیستم ردیابی پیشرفتهای به نام MammutConnect کردند. این سیستم در واقع یک پلتفرم پیشرفته برای ردیابی و مدیریت ناوگان حملونقل سنگین و... در سطح کشور است که روی خودروهای سنگین مثل کامیونها و اتوبوسها نصب شده.
مهاجمین به سرورهای مرکزی این سیستم که روی سرویس ابری ایرانی "ابرآروان" قرار دارد، نفوذ کردند و اقدام به پاکسازی کامل اطلاعات (Data Wiping) کردند. این اطلاعات شامل موقعیتهای لحظهای خودروها، دادههای فنی موتور، مصرف سوخت، رفتار رانندگان و سایر اطلاعات حیاتی بود
مهاجمین به سرورهای مرکزی این سیستم که روی سرویس ابری ایرانی "ابرآروان" قرار دارد، نفوذ کردند و اقدام به پاکسازی کامل اطلاعات (Data Wiping) کردند. این اطلاعات شامل موقعیتهای لحظهای خودروها، دادههای فنی موتور، مصرف سوخت، رفتار رانندگان و سایر اطلاعات حیاتی بود
❤1
APT IRAN
Photo
Attribution base on IP address is bad idea
Here is cool report about UAE APT , "Stealth Falcon".
https://research.checkpoint.com/2025/stealth-falcon-zero-day/
Here is cool report about UAE APT , "Stealth Falcon".
https://research.checkpoint.com/2025/stealth-falcon-zero-day/
❤4
a little "toolbox" of a Chinese red-team/pen-tester
https://netaskari.substack.com/p/whats-in-the-box
https://netaskari.substack.com/p/whats-in-the-box
👾4👍2❤1
#Venezuela
any professional security guy from Venezuela?
i'm looking for any technical details about following cyber incidents.
1- BGP Anomalies
2- Petróleos de Venezuela (PDVSA)
plz send a direct message i'm open to cooperate and TI sharing.
any professional security guy from Venezuela?
i'm looking for any technical details about following cyber incidents.
2- Petróleos de Venezuela (PDVSA)
plz send a direct message i'm open to cooperate and TI sharing.
❤4🔥1😁1🤯1
Denmark’s Military Intelligence (FE) warned officials to stop using Bluetooth headphones on duty due to eavesdropping risks, advising them to completely power off devices. This appears to be related to recent vulnerabilities in BT pairing.
https://whisperpair.eu/
https://whisperpair.eu/
😁5❤1👍1
Forwarded from Freedom Fox 🏴☠
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
Starlink Star-Earth Asset Collection and Detection Framework Seestar and Starlink Star-Earth Intelligence Data Collection
https://mp.weixin.qq.com/s?__biz=MzkwNjM4NTg4OQ==&mid=2247495727&idx=1&sn=30b9ff98d3f76c09882ff922aa2b5f57
https://mp.weixin.qq.com/s?__biz=MzkwNjM4NTg4OQ==&mid=2247495727&idx=1&sn=30b9ff98d3f76c09882ff922aa2b5f57
👍3
Source Byte
Starlink Star-Earth Asset Collection and Detection Framework Seestar and Starlink Star-Earth Intelligence Data Collection https://mp.weixin.qq.com/s?__biz=MzkwNjM4NTg4OQ==&mid=2247495727&idx=1&sn=30b9ff98d3f76c09882ff922aa2b5f57
This media is not supported in your browser
VIEW IN TELEGRAM
Virus disguised Sogou input method, malicious noscript embedded in formal signature
https://zhuanlan.zhihu.com/p/1949553669189116360
https://zhuanlan.zhihu.com/p/1949553669189116360
👍3