August 2023

How to add a custom problematic site block list in Opera

If Opera’s ad-blocking feature is a must for you, you might want to consider bolstering the default list with one that prevents annoyances l...

Sp123 31 Aug, 2023

IT threat evolution in Q2 2023. Non-mobile statistics

IT threat evolution in Q2 2023 IT threat evolution in Q2 2023. Non-mobile statistics IT threat evolution in Q2 2023. Mobile statistics ...

Sp123 30 Aug, 2023

Earth Estries Targets Government, Tech for Cyberespionage

We break down a new cyberespionage campaign deployed by a cybercriminal group we named Earth Estries. Analyzing the tactics, techniques, and...

Sp123 30 Aug, 2023

Qakbot botnet infrastructure shattered after international operation

Active since 2007, this prolific malware (also known as QBot or Pinkslipbot) evolved over time using different techniques to infect users an...

Sp123 30 Aug, 2023

4 Ways To Improve Your Cloud Security Posture Management

As cyberattacks against cloud services and infrastructure increase, follow these best practices to improve your cloud security posture manag...

Sp123 29 Aug, 2023

Quickpost: Analysis of PDF/ActiveMime Polyglot Maldocs

jpcert reported a new type of maldoc: “ MalDoc in PDF – Detection bypass by embedding a malicious Word file into a PDF file – “. These mald...

Sp123 29 Aug, 2023

For the win? Offensive research contests on criminal forums

We explore some of the entries in recent cybercrime research competitions, and what they say about threat actor innovation and priorities A...

Sp123 29 Aug, 2023

Flax Typhoon targeting Taiwan, Ransomware Emphasizing Linux-Centric Payloads

Flax Typhoon: Microsoft Uncovers Espionage Tactics Targeting Taiwan        Microsoft has detected malicious activities primarily targeting...

Sp123 29 Aug, 2023

iVerify is now an independent company!

We’re proud to announce that iVerify is now an independent company following its four-year incubation at Trail of Bits. Originally develope...

Sp123 28 Aug, 2023

Analysis of RAR Exploit Files (CVE-2023-38831), (Mon, Aug 28th)

My tool zipdump.py can be used to analyse the latest exploits of vulnerability CVE-2023-38831 in WinRAR. Article Link: https://isc.sans.edu...

Sp123 28 Aug, 2023

MalDoc in PDF - Detection bypass by embedding a malicious Word file into a PDF file –

JPCERT/CC has confirmed that a new technique was used in an attack that occurred in July, which bypasses detection by embedding a malicious ...

Sp123 28 Aug, 2023

ISC Stormcast For Monday, August 28th, 2023 https://ift.tt/6OIRP3q, (Mon, Aug 28th)

Article Link: https://isc.sans.edu/diary/rss/30162 1 post - 1 participant Read full topic Malware Analysis, News and Indicators - Lates...

Sp123 28 Aug, 2023

HTML Smuggling Leads to Domain Wide Ransomware

We’ve previously reported on a Nokoyawa ransomware case in which the initial access was via an Excel macro and IcedID malware. This case, wh...

Sp123 28 Aug, 2023

Update: sortcanon.py Version 0.0.3

Some new options for my tool sortcanon.py to handle more inputs. A bit of context: when one sorts a list of IPv4 addresses as text, one get...

Sp123 27 Aug, 2023

Adding Value to Data: The Power of Data Transformation for Improved Analytical Outcomes

Accessing abundant data, including metadata, plays a crucial role in accelerating law enforcement investigations and allowing authorities t...

Sp123 27 Aug, 2023