-
Mar 31, 2024
On March 29, 2024, a serious security vulnerability was discovered in the XZ Utils library. This library is used by many Linux distributions for data compression. The vulnerability, which has been assigned the CVE identifier CVE-2024-3094, is a backdoor that… read more »
-
Mar 26, 2024
Procrastination is the act of delaying or postponing a task or set of tasks. So, how do you stop procrastinating? Here are eight tips: The 2-Minute Rule If a task takes less than two minutes to complete, do it right… read more »
-
Jan 28, 2024
Today I’d like to show you my setup for integrate the pass password manager into the i3 desktop environment using a Bash script. The script is designed to automatically fill in the user and password fields in login forms, and… read more »
-
Dec 8, 2023
In a letter to the Department of Justice, Senator Ronnie Wyden reveals that foreign governments have been spying on how American citizens use their iPhones and Android phones through push notifications. Most people don’t think much of them, but some… read more »
-
Nov 19, 2023
The Russian cyber espionage group Gamaredon, affiliated with Russia’s Federal Security Service (FSB), has been observed using a worm called LitterDrifter, which spreads through USB devices in targeted attacks against Ukrainian entities. This tactic signifies an evolution in the group’s… read more »
-
Nov 12, 2023
At first glance, the relationship between privacy on Android phones may seem complicated. Given Google’s prominent role in the advertising business, where the bulk of its revenue is generated, it can be challenging to reconcile the idea of data collection… read more »
-
Oct 29, 2023
Microsoft has monitored the actions of a group named Octo Tempest (identified by Crowdstrike as Scattered Spider and my Mandiant as UNC3944), which has targeted multiple firms to extort money. The cybercriminals, linked to the BlackCat group (ALPHV), use a… read more »
-
Oct 20, 2023
What’s the difference between IoA and IOC, and why is it crucial to incorporate them into a security strategy? TL;DR Courtesy of CrowdStrike IoC IoA Artifacts that suggest a system has been breached. Patterns of behavior that indicate that an… read more »
-
Oct 8, 2023
Ransomware groups are constantly evolving their tactics and techniques to stay ahead of defenders. Cybersecurity firm Red Sense collected some information on major ransomware groups this summer, and created this useful chart showing the main changes they made to their… read more »
-
Oct 7, 2023
Personally, I am a big fan of NextDNS, a DNS service that (similar to PiHole) allows you to block traffic to advertising circuits, tracking and telemetry systems. This is why I have always been fascinated by the possibility of reproducing… read more »
-
Sep 26, 2023
RansomedVC is a recent ransomware collective, which was initially detected by Malwarebytes and SocRadar in August 2023 after publishing information about nine victims on its dark web page: It gained notoriety after announcing that it had violated SONY: The singular… read more »
-
Sep 24, 2023
Stealth Falcon APT (aka Project Raven or FruityArmor), a state-sponsored hacking group from the United Arab Emirates (UAE), is mainly known for targeting activists, journalists, and dissidents in the Middle East. Cybersecurity researchers from ESET have discovered a previously undocumented… read more »
-
Sep 15, 2023
UNC3944, a financially motivated threat group, has been leveraging SMS phishing (smishing) campaigns to target organizations and gain unauthorized access to their systems. According to a detailed report by Mandiant, the group uses phone-based social engineering and smishing to obtain… read more »
-
Aug 29, 2023
Japan’s computer emergency response team (JPCERT) recently identified a new attack method named ‘MalDoc in PDF’, which manages to elude detection by incorporating a malicious Word file within a PDF file. According to researchers, a MalDoc in PDF file possesses… read more »
-
Aug 28, 2023
Lockbit v3 (also known as Lockbit Black), surfaced in June 2022. However, September 2022 saw the leakage of its builder, enabling the creation of custom ransomware versions. The builder’s availability empowered any individual to tailor the ransomware, leading to the… read more »
-
Aug 13, 2023
Researchers at ESET have uncovered several cyber espionage campaigns carried out by the MoustachedBouncer group, which is linked to the Belarusian government. These cyber criminals used a variety of techniques to target foreign embassies in the country, using the NightClub… read more »
-
Aug 5, 2023
SOC Multi-tool is a browser extension with a wide range of features and capabilities. The project is community-driven and the developer (Zachary Henard) encourages users to contribute and share better resources. Available on the Chrome Web Store and compatible with… read more »
-
Jul 17, 2023
The task of adversary attribution and how it should be done is a controversial topic in the cyber threat intelligence community. This is because there is no standardized way of doing attribution, starting with naming the threat actors. Each security… read more »
-
Jul 14, 2023
Analysts from cybersecurity firm Wiz discovered a new fileless malware named PyLoose targeting cloud workloads to hijack their computational resources for Monero cryptocurrency mining. PyLoose is a Python script with a precompiled, base64-encoded XMRig miner, a widely abused open-source tool… read more »
-
Jul 8, 2023
Iran-linked threat actor APT42 has been identified as the source of a recent malware campaign that targets both Windows and macOS operating systems. APT42, also known as Charming Kitten, PHOSPHORUS and TA453, is a notorious nation-state actor known for its… read more »