Threat Actor: Various | threat actors Victim: Organizations globally | organizations globally
Key Point :
CTI is essential for understanding the nature of cyber threats and enabling proactive defense strategies.…Threat Actor: Various | threat actors Victim: Organizations globally | organizations globally
Key Point :
CTI is essential for understanding the nature of cyber threats and enabling proactive defense strategies.…โก๏ธ ๐๐ซ๐-๐ซ๐๐ช๐ฎ๐ข๐ฌ๐ข๐ญ๐๐ฌโญ Introduction to Malware Analysis https://github.com/0xrajneesh/Malware-Analysis-Projects-for-Beginners/blob/main/Introduction-to-Malware-Analysis.mdโญ Malware Analyst Guide 2024 https://youtu.be/tUsx0I0TK54โก๏ธ ๐๐๐ฅ๐ฐ๐๐ซ๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ข๐ฌ ๐๐ซ๐จ๐ฃ๐๐๐ญ๐ฌโญ Static Analysis of a Simple Malware Sample https://github.com/0xrajneesh/Malware-Analysis-Projects-for-Beginners/blob/main/Project Static Analysis of a Simple Malware Sample.mdโญ Analyzing FTP Log Files Using Splunk SIEM https://github.com/0xrajneesh/Splunk-Projects-For-Beginners/blob/main/project%232-analyzing-ftp-logs-using-splunk-siem.mdโญ Analyzing HTTP Log Files Using Splunk SIEM https://github.com/0xrajneesh/Splunk-Projects-For-Beginners/blob/main/project%233-analyzing-http-logs-using-splunk-siem.mdโญ…
Keypoints:
The speaker shares their thoughts on the implications of their statements.…Threat Actor: CryptBot Operators | CryptBot Operators Victim: Users of Cracked Software | users of cracked software
Key Point :
CryptBot is primarily distributed through fake cracked software and Pay-Per-Install solutions like PrivateLoader.…Keypoints :
The cyber threat landscape is becoming increasingly sophisticated and hazardous.…The video discusses the future of cyber security and features insights from a special guest, Unix Guy, who shares his perspective on the current job market, valuable areas to focus on, and tips for future-proofing a cyber security career.
Keypoints:
Optimal areas for cyber security careers in 2025 include blue team roles, particularly SOC Analysts and Cyber Analysts, due to high demand.…Keypoints :
Info stealers are subtle but dangerous threats in the cybersecurity landscape.…Keypoints :
DORA will be enforced starting January 2025, targeting organizations with a daily turnover exceeding โฌ50 million.…Keypoints :
AiTM phishing kits enhance traditional phishing by allowing real-time interception of communications.…Keypoints :
Ownership of an IP address associated with the PlugX worm was successfully taken in September 2023.…As Xiaomi emerges as a leader in consumer electronics and smart devices, it faces a growing array of cybersecurity challenges that impact the security and privacy of its users. Recent reports have shed light on significant vulnerabilities that could expose sensitive user information, necessitating a deeper investigation into the inherent risks associated with using Xiaomi products.…
Summary :
Huntress has analyzed a new malware family named Malichus, exploiting a 0-day vulnerability in Cleo software. The malware employs a multi-stage attack involving PowerShell and Java components to establish a backdoor for further exploitation. #Malichus #CleoSoftware #CyberSecurity
Keypoints :
Malichus is a new malware family targeting Cleo software through a 0-day vulnerability.…Summary :
eSentire’s Threat Response Unit (TRU) has identified a new malware campaign named “CleverSoar” that targets Chinese and Vietnamese-speaking users through malicious installer packages. The malware utilizes the Winos4.0 framework and poses significant risks to Windows users. #CleverSoar #Winos4 #CyberThreats
Keypoints :
eSentire operates 24/7 SOCs with elite threat hunters and cyber analysts.…Summary :
YARA is a powerful tool for malware detection and classification, extensively used by Sekoia.io’s Threat Detection and Research team. The integration of YARA into their workflows enhances threat hunting and malware analysis, and the release of their YARA rules on GitHub fosters community collaboration.…