“Caffeine” Phishing Service Domains, Patterns Still Heavily Used After Store Seemingly Defunct.Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives.Stealthy USB: New versions of Chinese espionage malware propagating through USB devices found by Check Point Research.Phishing Tools for Purchase: A Closer Look at Facebook Scamming Groups.‘Sign in to continue’ and suffer : Attackers abusing legitimate services for credential theft.Sintesi riepilogativa delle campagne malevole nella settimana del 17 – 23 giugno 2023 Files for an ISC diary (obama271 Qakbot).– 30 days of Formbook: Day 18, Thursday – “K2L0”. – 30 days of Formbook: Day 17, Wednesday – ModiLoader for XLoader “NVP4”.– 30 days of Formbook: Day 16, Tuesday – “F1W6”.– 30 days of Formbook: Day 15, Thursday – “CE18”.– 30 days of Formbook: Day 14, Thursday – “JY05”.– 30 days of Formbook: Day 13, Thursday – “MR04”.Brad Duncan at Malware Traffic Analysis.Unpacking RDStealer: An Exfiltration Malware Targeting RDP Workloads Over Half of Malicious Files are HTML Attachments.Python Threat Hunting Tools: Part 8 - Parsing JSONĪnomali Cyber Watch: Cadet Blizzard – New GRU APT, ChamelDoH Hard-to-Detect Linux RAT, Stealthy DoubleFinger Targets Cryptocurrency Incident Response: Bring Out the Body File How Database Forensics works on New Cybercrime Platforms?Īnalyzing Volatile Memory on a Google Kubernetes Engine Node “Registry Run Keys: The Secret Sauce of Persistent Malware!”.Volume Shadow Files: Guardians of Lost Data.Investigating Default Web Browser on Windows Open-Sourcing Raspberry Pi Software for Firewall Functionality: Secure Sideloading of Extraction Agent Kushalveer Singh Bachchas at AT&T Cybersecurityĭigital dumpster diving: Exploring the intricacies of recycle bin forensics.Open-Box Acquisition Using the Internal Hard Disk Drive As always, thanks to those who give a little back for their support! FORENSIC ANALYSIS
0 Comments
Leave a Reply. |