September 2024

Champagne Attack Chains on a Kool-Aid Budget

Hello to all our Pumpkin Spice cyber friends! Join host Selena Larson and today’s co-host, Tim Kromphardt, as they chat with Joe Wise, Seni...

Sp123 30 Sept, 2024

Event Log Talks a Lot: Identifying Human-operated Ransomware through Windows Event Logs

The difficult part of the initial response to a human-operated ransomware attack is identifying the attack vector. You may already know from...

Sp123 30 Sept, 2024

Windows Shell Items Analysis

Shell-Item Analysis Windows 10 shell items are metadata files that hold details about various objects in the Windows operating system, incl...

Sp123 29 Sept, 2024

Detecting and Mitigating Remote Code Execution Exploits in CUPS

On September 26th, 2024, details were released about several vulnerabilities in the Common Unix Printing System (CUPS) package. A total of ...

Sp123 29 Sept, 2024

윈도우 11 kb5043145 미리보기 업데이트

마이크로소프트에서 제공을 하고 있는 운영체제인 윈도우 11에 대한 3가지 개선 사항과 수정 사항이 포함된 Windows 11 23H2 및 22H2용 2024년 9월 미리 보기 누적 업데이트 제공을 하고 있습니다.KB… Article Link: 윈도우...

Sp123 29 Sept, 2024

Malware Analysis - ConfuserEx 2 Deobfuscation with Python and dnlib, BBTok Loader

Article Link: https://www.youtube.com/watch?v=Pjy50g6naMU 1 post - 1 participant Read full topic Malware Analysis, News and Indicators ...

Sp123 29 Sept, 2024

Ghidra Tip 0x06: DomainFiles in Projects

This article is based on the public release of Ghidra 11.2. Ghidra’s project based nature allows one to include multiple files into a projec...

Sp123 28 Sept, 2024

Five ways to beef up network security and reduce data theft

These five best practices are the blocking and tackling of network data security that never go out of style. Article Link: Five ways to bee...

Sp123 27 Sept, 2024

The Exodus Began: Alternatives for Telegram

The Exodus Began: Alternatives for Telegram As Telegram implements new policies to curb illegal activities by using AI to detect and hide u...

Sp123 27 Sept, 2024

Top Spear Phishing Methods

In this episode of the Security Swarm Podcast, host Andy Syrewicze and guest Romain Basset dive into the top spear phishing methods used in ...

Sp123 27 Sept, 2024

How to protect yourself against cyber espionage

In recent months, the government of The Netherlands has made an unusual first. First, they have admitted key government IT systems had exp...

Sp123 27 Sept, 2024

Threat landscape for industrial automation systems, Q2 2024

Statistics across all threats In the second quarter of 2024, the percentage of ICS computers on which malicious objects were blocked decre...

Sp123 26 Sept, 2024

Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

Since 2023, Microsoft has seen a 2.75 times increase in the number of organizations encountering ransomware campaigns. 1 And up to 90% of s...

Sp123 26 Sept, 2024

From 12 to 21: how we discovered connections between the Twelve and BlackJack groups

While analyzing attacks on Russian organizations, our team regularly encounters overlapping tactics, techniques, and procedures (TTPs) amon...

Sp123 25 Sept, 2024

A Multi-layered Approach to Detecting Impersonation Scams

I am your bank. I am your police. I am your lover. Article Link: A Multi-layered Approach to Detecting Impersonation Scams 1 post - 1...

Sp123 25 Sept, 2024