Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2022.02.04.md
Cobalt Strike, a Defender’s Guide – Part 2 - https://thedfirreport.com/2022/01/24/cobalt-strike-a-defenders-guide-part-2/
How to Analyze RTF Template Injection Attacks - https://letsdefend.io/blog/how-to-analyze-rtf-template-injection-attacks//
How Deauth Attacks Jam WiFi Devices | HakByte - https://www.youtube.com/watch?v=M54ZhpnhACc
Using Power Automate for Covert Data Exfiltration in Microsoft 365 - https://www.varonis.com/blog/power-automate-data-exfiltration
Android malware BRATA can wipe devices - https://blog.malwarebytes.com/android/2022/02/android-malware-brata-can-wipe-devices/
Cobalt Strike, a Defender’s Guide – Part 2 - https://thedfirreport.com/2022/01/24/cobalt-strike-a-defenders-guide-part-2/
How to Analyze RTF Template Injection Attacks - https://letsdefend.io/blog/how-to-analyze-rtf-template-injection-attacks//
How Deauth Attacks Jam WiFi Devices | HakByte - https://www.youtube.com/watch?v=M54ZhpnhACc
Using Power Automate for Covert Data Exfiltration in Microsoft 365 - https://www.varonis.com/blog/power-automate-data-exfiltration
Android malware BRATA can wipe devices - https://blog.malwarebytes.com/android/2022/02/android-malware-brata-can-wipe-devices/
Zaloguj się aby komentować