In episode 122 for May 25th 2020: Apple and the US Government dispute over law enforcement backdoors in Apple products, secure messaging app Signal starts to move away from using phone numbers as user IDs, and details on the EasyJet data breach affecti… Continue reading Apple’s Law Enforcement Backdoor Dispute, Signal PINs, EasyJet Data Breach
By Deeba Ahmed
Winnti hacking group previously targeted GRAVITY gaming firm in South Korea.
This is a post from HackRead.com Read the original post: Winnti hacking group hits gaming firms with new backdoor malware
Continue reading Winnti hacking group hits gaming firms with new backdoor malware
I am currently investigating how to find embedded shellcodes in PE files.
Can we find backdoored file using Metasploit?
A Huawei employee submitted a large, buggy patch to the Linux kernel—apparently it contained a “trivially exploitable” security hole.
The post Was This Huawei’s Failed Attempt at a Linux Backdoor? appeared first on Security Boulevard.
Continue reading Was This Huawei’s Failed Attempt at a Linux Backdoor?
I’m doing in static analysis of PE file.
Can PE file have two or more executable sections?
How can we detect whether it is injected or not?
Our colleagues at Checkpoint put together a fine research writeup on some Naikon resources and activity related to “aria-body” that we detected in 2017 and similarly reported in 2018. Continue reading Naikon’s Aria
The Chinese APT has been discovered behind a five-year espionage campaign that compromises government servers – and uses that as leverage for other attacks. Continue reading Naikon APT Hid Five-Year Espionage Attack Under Radar
I am learning some web security. I have encountered some webshell on a system and want to test it further.
Before i test it on my system i want to know whether there is any backdoor in the above shell whic… Continue reading Any backdoor in this webshell script [closed]
I am doing research in identifying backdoors in Windows .exe files. Currently I found some methods to detect them:
String search in .exe
Find reference .dll and win32 API calls using import table
What are other static analysis methods … Continue reading static analysis for identifying backdoors in PE
For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. This is our latest installment, focusing on activities that we observed during Q1 2020. Continue reading APT trends report Q1 2020