|
You are here |
blog.talosintelligence.com | ||
| | | | |
intezer.com
|
|
| | | | | Symbiote is a new Linux® malware we discovered that acts in a parasitic nature, infecting other running processes to inflict damage on machines. | |
| | | | |
thehackernews.com
|
|
| | | | | AI-created VS Code malware and fake npm packages reveal how attackers exploit open-source trust. | |
| | | | |
forensicitguy.github.io
|
|
| | | | | In a previous blog post I mentioned how adversaries using VHD files to distribute malware can leave around a lot more data than they intend, including identifiable data for tracking. In this post I want to break out the best friend everyone made during SANS FOR508, Plaso, so I can process the filesystem data for a malicious VHD and illustrate how we can establish a timeline of operations for the adversary. Just like last time, the sample I'm working with is here in MalwareBazaar: https://bazaar.abuse.ch/sample/72ba4bd27c5d95912ac5e572849f0aaf56c5873e03f5596cb82e56ac879e3614/. | |
| | | | |
shopifyninja.ca
|
|
| | | In the world of cybersecurity, a sandbox refers to an isolated environment on a network that behaves in end-user operating environments. | ||