Turla’s ‘Crutch’ Backdoor Leverages Dropbox in Espionage Attacks

In a recent cyberattack against an E.U. country’s Ministry of Foreign Affairs, the Crutch backdoor leveraged Dropbox to exfiltrate sensitive documents. Continue reading Turla’s ‘Crutch’ Backdoor Leverages Dropbox in Espionage Attacks

Five Eyes Cybersecurity Agencies Release Report on Hacking Tools

The national cybersecurity agencies of the United States, U.K., Canada, Australia and New Zealand, known in the intelligence world as the Five Eyes, have released a joint report on five publicly available hacking tools that are widely used in cyberatt… Continue reading Five Eyes Cybersecurity Agencies Release Report on Hacking Tools

Domain Fronting – Tradecraft Security Weekly #18

Domain fronting is a technique used to mask command and control (C2) traffic. It is possible for C2 channels to be proxied through CDN’s like Cloudfront to make it appear like normal Internet traffic. It is very difficult to detect and block for defenders as it appears as if clients on a network are connecting […]

The post Domain Fronting – Tradecraft Security Weekly #18 appeared first on Security Weekly.

Continue reading Domain Fronting – Tradecraft Security Weekly #18

Javelin ADProtect vs. Microsoft ATA with Almog Ohayon – Paul’s Security Weekly #523

Almog Ohayon of Javelin Networks pits Javelin ADProtect against Microsoft ATA in an epic threat analytics showdown! Full Show Notes Subscribe to YouTube Channel

The post Javelin ADProtect vs. Microsoft ATA with Almog Ohayon – Paul’s Security Weekly #523 appeared first on Security Weekly.

Continue reading Javelin ADProtect vs. Microsoft ATA with Almog Ohayon – Paul’s Security Weekly #523

Detecting The Empire’s Death Star Attack – Paul’s Security Weekly #517

byt3bl33d3r recently released “DeathStar”, which uses Powershell Empire’s API to automatically obtain Domain Admin privileges in an Active Directory environment with the click of a button. Some may ask, “How do I detect and prevent this attack?” Tune in to this segment to find out how to use products available from Javelin Networks to do Continue reading Detecting The Empire’s Death Star Attack – Paul’s Security Weekly #517

Empire – PowerShell Post-Exploitation Agent

Empire is a pure PowerShell post-exploitation agent built on cryptographically secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitatio… Continue reading Empire – PowerShell Post-Exploitation Agent