A Compilation of Personally Identifiable Targeted IP Addresses from Booter.tw Malicious Web Site Stress Testing Tool – An OSINT Analysis

The following is a list o…A Compilation of Personally Identifiable Targeted IP Addresses from Booter.tw Malicious Web Site Stress Testing Tool – An OSINT Analysis was first posted on September 30, 2023 at 8:13 pm.©2021 "". U… Continue reading A Compilation of Personally Identifiable Targeted IP Addresses from Booter.tw Malicious Web Site Stress Testing Tool – An OSINT Analysis

A Compilation of Personally Identifiable Email Address Accounts from Booter.tw Malicious Web Site Stress Testing Tool – An OSINT Analysis

The following is a list o…A Compilation of Personally Identifiable Email Address Accounts from Booter.tw Malicious Web Site Stress Testing Tool – An OSINT Analysis was first posted on September 30, 2023 at 8:13 pm.©2021 "". … Continue reading A Compilation of Personally Identifiable Email Address Accounts from Booter.tw Malicious Web Site Stress Testing Tool – An OSINT Analysis

Exposing the Internet-Connected Infrastructure of the Cybercriminals Behind the Recent Github Rogue and Malware Embedded Malicious Repositories Malware Campaign – An OSINT Analysis – A PDF Paper

This content is for members only. Visit the site and log in/register to read.
Continue reading Exposing the Internet-Connected Infrastructure of the Cybercriminals Behind the Recent Github Rogue and Malware Embedded Malicious Repositories Malware Campaign – An OSINT Analysis – A PDF Paper

[SANS ISC] Suspicious PDF Connecting to a Remote SMB Share

I published the following diary on isc.sans.edu: “Suspicious PDF Connecting to a Remote SMB Share”: Yesterday I stumbled upon a PDF file that was flagged as suspicious by a customer’s anti-malware solution and placed in the quarantine. Later, the recipient contacted the team in charge of emails to access his document because

[The post [SANS ISC] Suspicious PDF Connecting to a Remote SMB Share has been first published on /dev/random]

Continue reading [SANS ISC] Suspicious PDF Connecting to a Remote SMB Share

The FBI Created a Fake FedEx Website to Unmask a Cybercriminal

In an attempt to identify someone tricking a company into handing over cash, the FBI created a fake FedEx website, as well as deployed booby-trapped Word documents to reveal fraudsters’ IP addresses. Continue reading The FBI Created a Fake FedEx Website to Unmask a Cybercriminal

[SANS ISC] Dissecting Malicious Office Documents with Linux

I published the following diary on isc.sans.edu: “Dissecting Malicious Office Documents with Linux”: A few months ago, Rob wrote a nice diary to explain how to dissect a (malicious) Office document (.docx). The approach was to use the OpenXML SDK with Powershell. This is nice but how to achieve the

[The post [SANS ISC] Dissecting Malicious Office Documents with Linux has been first published on /dev/random]

Continue reading [SANS ISC] Dissecting Malicious Office Documents with Linux

Q2 Appthority Pulse Report Finds Chat Apps Most Popular, Risky & Blacklisted Apps

Today Appthority released our Q2 Enterprise Mobile Security Pulse Report. The report looks at three areas of interest to enterprise mobility and security teams: 1) the most common iOS and Android apps in enterprises, 2) th… Continue reading Q2 Appthority Pulse Report Finds Chat Apps Most Popular, Risky & Blacklisted Apps

[SANS ISC] Malicious JavaScript Targeting Mobile Browsers

I published the following diary on isc.sans.org: “Malicious JavaScript Targeting Mobile Browsers“: A reader reported a suspicious piece of a Javascript code that was found on a website. In the meantime, the compromized website has been cleaned but it was running WordPress (again, I would say![1]).  The code was obfuscated,

[The post [SANS ISC] Malicious JavaScript Targeting Mobile Browsers has been first published on /dev/random]

Continue reading [SANS ISC] Malicious JavaScript Targeting Mobile Browsers

[SANS ISC] Malicious Post-Exploitation Batch File

I published the following diary on isc.sans.org: “Malicious Post-Exploitation Batch File“: Here is another interesting file that I found while hunting. It is a malicious Windows batch file (.bat) which helps to exploit a freshly compromised system (or… to be used by a rogue user). I don’t have a lot of

[The post [SANS ISC] Malicious Post-Exploitation Batch File has been first published on /dev/random]

Continue reading [SANS ISC] Malicious Post-Exploitation Batch File

A smarter approach to artificial intelligence and machine learning in mobile security

There’s a lot of talk these days about how artificial intelligence (AI) and machine learning will transform every industry, from agriculture (as CNN Tech recently reported) to zoo-keeping (as reported by the BBC). Cyberse… Continue reading A smarter approach to artificial intelligence and machine learning in mobile security