• Frebniis: new malware targets Microsoft IIS

    Recent research by security firm Symantec has uncovered a new strain of malware called FrebniiS that is specifically designed to target servers running Microsoft Internet Information Services (IIS) software. This malware is designed to steal sensitive data from the servers,… read more »
  • Some thoughts on MLOps security

    MLOps, which stands for Machine Learning Operations, is a relatively new field that focuses on the integration of machine learning models into the development and deployment processes of software applications. MLOps can bring significant benefits to organizations, such as improving… read more »
  • Beep, a new highly evasive malware

    Analysis by MinervaLabs has revealed a new type of malware called BEEP, a highly stealthy malware that can evade detection by most antivirus software. It uses a variety of techniques to hide itself, including encrypting its code and only decrypting… read more »
  • Clipboard malware found in 450+ PyPI Packages

    A new cybersecurity threat for Python developers has been reported, where malicious actors have published over 451 unique Python packages to the official Python Package Index (PyPI) repository. The aim is to infect developer systems with a clipboard-based crypto wallet… read more »
  • How to build a Security Operations Center on a budget

    As organizations continue to face increasingly sophisticated cyber threats, the importance of having a robust security operations center (SOC) has become clear. However, for many organizations, the cost of setting up a SOC can be prohibitive, especially for small to… read more »
  • How to detect Sliver C2 framework activities

    Sliver is an open source cross-platform adversary emulation/red team framework, developed for penetration testing purposes but, as other similar softwares like Cobalt Strike, is also used by cybercriminals to malicious activities. It is becoming increasingly popular among cybercrime gangs due… read more »
  • Most hi-end Android devices sold in China have pre-installed malware

    A recent study by researchers at the University of Edinburgh and Trinity College Dublin has revealed that most of top-of-the-range Android devices sold in China are being shipped with spyware. According to the research, a large number of devices are… read more »
  • Russian threat group steal screenshots from victims devices

    A Russian threat group, dubbed TA866 by Proofpoint, is suspected of using a new technique to steal sensitive information. The group has been taking screenshots of infected devices and uploading them to a remote server. The use of screenshots is… read more »
  • First Linux version of Clop ransomware has flaw in encryption algorithm

    The first Linux version of the Clop ransomware has been discovered, with a flaw in its encryption algorithm that allows it to be decrypted without paying the ransom. Cybersecurity firm SentinelOne discovered the ELF version on 26 December 2022, and… read more »
  • GuLoader: new version uses Nullsoft Scriptable Install System

    Several e-commerce industries in South Korea and the United States are being targeted by a GuLoader malware campaign, according to a report from cybersecurity firm Trellix. The attack is notable for its transition from using malware-laden Microsoft Word documents to… read more »
  • When the sunlight shines through the leaves of trees

    I have released my new musical work, Komorebi: a 4-track album that explores the world of electronic, lo-fi music, with each track designed to create a relaxing and peaceful atmosphere. The title of the album, Komorebi, is a Japanese word… read more »
  • Prilex malware evolves to target NFC-enabled POS

    Kaspersky Lab cybersecurity experts have discovered a new version of the Prilex point-of-sale (PoS) malware that has been enhanced to target transactions using NFC technology and is believed to be the most advanced PoS threat to date. The Prilex malware… read more »
  • NIST releases new framework for responsible use and development of AI

    The National Institute of Standards and Technology (NIST) has released the Artificial Intelligence Risk Management Framework (AI RMF 1.0) which provides guidelines for organizations to manage risks and promote responsible use of AI systems. The framework outlines the characteristics of… read more »
  • TrickGate: a shellcode-based packer undetected for years

    TrickGate is a shellcode-based packer that has been operating successfully and undetected for over six years. It is offered as a service to other threat actors to help hide malware payloads behind a layer of wrapper code and bypass security… read more »
  • UNC2565: New enhancements to GOOTLOADER malware

    The UNC2565 group behind the GOOTLOADER malware continues to improve its code by adding new components and obfuscation techniques to evade detection. GOOTLOADER is a stealthy malware, classified as a first-stage downloader, designed to target Windows-based systems. It is considered… read more »
  • SwiftSlicer: a new Golang-based wiper malware

    Cyber security firm ESET has reported that Ukraine has been hit by a new cyber attack from Russia using a previously undocumented data wiper called SwiftSlicer. The attack has been attributed to Sandworm, a nation-state group linked to Military Unit… read more »
  • New PlugX malware variant spreads via removable USB storage devices

    Cyber-security researchers at Palo Alto Networks’ Unit 42 have discovered a new variant of the PlugX malware that can infect connected USB removable media devices to spread to additional systems. PlugX is a type of malware that is primarily used… read more »
  • PY#RATION: new Python-based malware

    Researchers at threat analytics firm Securonix have uncovered a new Python-based malware that has been spotted in the wild. The malware, named PY#RATION, is a remote access trojan (RAT) that gives its operators control over breached systems. According to Securonix,… read more »
  • Static malware analysis: a basic workflow

    Static malware analysis is the process of analysing malware samples without executing them. In this post, I’d like to share my basic workflow for static malware analysis, with tools and techniques that can be used at each stage. 1. File… read more »
  • Windows 11 build 22H2 breaks recording of 4688 event

    A very short article that I think will be useful to DFIR colleagues. According to this article from Microsoft, after installing Windows 11 build 22H2, Windows events 4688 stopped working correctly. Event ID 4688 is a Windows security event that… read more »