August 2023
How to add a custom problematic site block list in Opera
If Opera’s ad-blocking feature is a must for you, you might want to consider bolstering the default list with one that prevents annoyances l...
IT threat evolution in Q2 2023. Non-mobile statistics
IT threat evolution in Q2 2023 IT threat evolution in Q2 2023. Non-mobile statistics IT threat evolution in Q2 2023. Mobile statistics ...
Earth Estries Targets Government, Tech for Cyberespionage
We break down a new cyberespionage campaign deployed by a cybercriminal group we named Earth Estries. Analyzing the tactics, techniques, and...
Qakbot botnet infrastructure shattered after international operation
Active since 2007, this prolific malware (also known as QBot or Pinkslipbot) evolved over time using different techniques to infect users an...
4 Ways To Improve Your Cloud Security Posture Management
As cyberattacks against cloud services and infrastructure increase, follow these best practices to improve your cloud security posture manag...
Quickpost: Analysis of PDF/ActiveMime Polyglot Maldocs
jpcert reported a new type of maldoc: “ MalDoc in PDF – Detection bypass by embedding a malicious Word file into a PDF file – “. These mald...
For the win? Offensive research contests on criminal forums
We explore some of the entries in recent cybercrime research competitions, and what they say about threat actor innovation and priorities A...
Flax Typhoon targeting Taiwan, Ransomware Emphasizing Linux-Centric Payloads
Flax Typhoon: Microsoft Uncovers Espionage Tactics Targeting Taiwan Microsoft has detected malicious activities primarily targeting...
iVerify is now an independent company!
We’re proud to announce that iVerify is now an independent company following its four-year incubation at Trail of Bits. Originally develope...
Analysis of RAR Exploit Files (CVE-2023-38831), (Mon, Aug 28th)
My tool zipdump.py can be used to analyse the latest exploits of vulnerability CVE-2023-38831 in WinRAR. Article Link: https://isc.sans.edu...
MalDoc in PDF - Detection bypass by embedding a malicious Word file into a PDF file –
JPCERT/CC has confirmed that a new technique was used in an attack that occurred in July, which bypasses detection by embedding a malicious ...
ISC Stormcast For Monday, August 28th, 2023 https://ift.tt/6OIRP3q, (Mon, Aug 28th)
Article Link: https://isc.sans.edu/diary/rss/30162 1 post - 1 participant Read full topic Malware Analysis, News and Indicators - Lates...
HTML Smuggling Leads to Domain Wide Ransomware
We’ve previously reported on a Nokoyawa ransomware case in which the initial access was via an Excel macro and IcedID malware. This case, wh...
Update: sortcanon.py Version 0.0.3
Some new options for my tool sortcanon.py to handle more inputs. A bit of context: when one sorts a list of IPv4 addresses as text, one get...
Adding Value to Data: The Power of Data Transformation for Improved Analytical Outcomes
Accessing abundant data, including metadata, plays a crucial role in accelerating law enforcement investigations and allowing authorities t...
Popular Posts
Archive
- Jun 2025 [62]
- May 2025 [87]
- Apr 2025 [76]
- Mar 2025 [83]
- Feb 2025 [71]
- Jan 2025 [81]
- Dec 2024 [82]
- Nov 2024 [77]
- Oct 2024 [75]
- Sept 2024 [85]
- Aug 2024 [85]
- Jul 2024 [73]
- Jun 2024 [76]
- May 2024 [81]
- Apr 2024 [77]
- Mar 2024 [61]
- Feb 2024 [72]
- Jan 2024 [84]
- Dec 2023 [73]
- Nov 2023 [74]
- Oct 2023 [115]
- Sept 2023 [136]
- Aug 2023 [134]
- Jul 2023 [48]
- Jun 2023 [15]