Link on Github --> https://github.com/Nieuport/news-and-links/blob/gh-pages/docs/2022.07.10.md
WarzoneRAT Can Now Evade Detection With Process Hollowing - https://www.uptycs.com/blog/warzonerat-can-now-evade-with-process-hollowing
De-anymizing ransomware domains on the dark web - https://blog.talosintelligence.com/2022/06/de-anonymizing-ransomware-domains-on.html
OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow - https://www.intezer.com/blog/incident-response/orbit-new-undetected-linux-threat/
ABUSING CVE-2022-26923 THROUGH SOCKS5 ON A MYTHIC C2 AGENT - https://macrosec.tech/index.php/2022/06/01/abusing-cve-2022-26923-through-socks5-on-a-mythic-c2-agent/
Understanding Pointers for Reverse Engineers - Pointer Basics in Assembly - https://www.youtube.com/watch?v=x0eYXkIhUUY
WarzoneRAT Can Now Evade Detection With Process Hollowing - https://www.uptycs.com/blog/warzonerat-can-now-evade-with-process-hollowing
De-anymizing ransomware domains on the dark web - https://blog.talosintelligence.com/2022/06/de-anonymizing-ransomware-domains-on.html
OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow - https://www.intezer.com/blog/incident-response/orbit-new-undetected-linux-threat/
ABUSING CVE-2022-26923 THROUGH SOCKS5 ON A MYTHIC C2 AGENT - https://macrosec.tech/index.php/2022/06/01/abusing-cve-2022-26923-through-socks5-on-a-mythic-c2-agent/
Understanding Pointers for Reverse Engineers - Pointer Basics in Assembly - https://www.youtube.com/watch?v=x0eYXkIhUUY
Zaloguj się aby komentować