-
Jun 12, 2022
Cybersecurity Multi-factor Authentication In-The-Wild bypass methods Two-factor authentication (2FA) or multi-factor authentication ( MFA ) is a method to authenticate through a service that requires at least two proofs of recognition. PACMAN M1 chip attack defeats ‘the last line of… read more »
-
Jun 11, 2022
Some days ago, a follower asked me for more information about an article announcing the possibility of hacking iPhones even when switched off. Actually, the situation is not that serious, but let’s take a step back. “slide to power off”… read more »
-
Jun 5, 2022
Cybersecurity Microsoft disrupts Bohrium hackers’ spear-phishing operation The Microsoft Digital Crimes Unit (DCU) has disrupted a spear-phishing operation linked to an Iranian threat actor tracked as Bohrium that targeted customers in the U.S., Middle East, and India. SMSFactory Android Trojan… read more »
-
May 29, 2022
Cybersecurity Operation Delilah: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Actor Today, INTERPOL and The Nigeria Police Force announced the arrest of a prominent business email compromise (BEC) actor who has been active since 2015. How This Shocking… read more »
-
May 22, 2022
Cybersecurity ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups IBM Security X-Force researchers have continually analyzed the use of several crypters developed by the cybercriminal group ITG23, also known as Wizard Spider, DEV-0193, or simply the “Trickbot Group”. InfoSec Handlers Diary… read more »
-
May 15, 2022
Cybersecurity Harmful Help: Analyzing a Malicious Compiled HTML Help File Delivering Agent Tesla This blog describes an attack that Unit 42 observed utilizing malicious compiled HTML help files for the initial delivery. We will show how to analyze the malicious… read more »
-
May 8, 2022
Cybersecurity Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding Cobalt Strike is commercial threat emulation software that emulates a quiet, long-term embedded actor in a network. This actor, known as Beacon, communicates with an external team server to… read more »
-
May 8, 2022
Gather all worries related to pandemics, wars and personal problems, process them, obtain what could be a glimmer of hope for a better tomorrow and put it on the stave. Album cover “Fleeting Moment of Truth”, my new album, is… read more »