Explore >> Select a destination


You are here

lab52.io
| | securityinaction.wordpress.com
3.0 parsecs away

Travel
| | TL; DR In recent months threat actors have been leveraging alternative means of compromising Windows based systems in order to evade detection. Make certain to download and install software from legitimate sources and where possible make use of the Windows driver blocklist (further recommendations listed below). ==================== By employing techniques such as DLL sideloading (defined...
| | blog.eclecticiq.com
2.3 parsecs away

Travel
| | EclecticIQ researchers continue to track a Chinese state-sponsored APT group called Mustang Panda. In December 2022, this group started targeting Europe with a new spearphishing campaign using a customized variant of the PlugX backdoor.
| | blog.talosintelligence.com
2.0 parsecs away

Travel
| | * Cisco Talos has observed an unknown threat actor conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. * The decoy email and fake PDF filenames are designed to impersonate a company's legal department, attempting to lure the victim into downloading and executing malware. * This campaign abuses Google's
| | www.netskope.com
12.3 parsecs away

Travel
| Summary DLL side-loading is a popular technique used by threat actors to execute malicious payloads under the umbrella of a benign, usually legitimate,