You are here |
lab52.io | ||
| | | |
blog.talosintelligence.com
|
|
| | | | * Cisco Talos has observed an unknown threat actor conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. * The decoy email and fake PDF filenames are designed to impersonate a company's legal department, attempting to lure the victim into downloading and executing malware. * This campaign abuses Google's | |
| | | |
securityinaction.wordpress.com
|
|
| | | | TL; DR In recent months threat actors have been leveraging alternative means of compromising Windows based systems in order to evade detection. Make certain to download and install software from legitimate sources and where possible make use of the Windows driver blocklist (further recommendations listed below). ==================== By employing techniques such as DLL sideloading (defined... | |
| | | |
cyble.com
|
|
| | | | Discover how the Mustang Panda APT group targets entities using sophisticated malware, including LNK files and DLL sideloading, in recent campaigns. | |
| | | |
www.kusari.dev
|
|
| | Kusari expert blog about National Security Agency (NSA) Recommendations for SBOM Management; one important aspect not in their report |