|
You are here |
intezer.com | ||
| | | | |
cyble.com
|
|
| | | | | Discover how the Mustang Panda APT group targets entities using sophisticated malware, including LNK files and DLL sideloading, in recent campaigns. | |
| | | | |
thehackernews.com
|
|
| | | | | Ever worried about malware in PDFs? ANY.RUN's sandbox can expose hidden threats just by analyzing the file's structure. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | * Cisco Talos has observed an unknown threat actor conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. * The decoy email and fake PDF filenames are designed to impersonate a company's legal department, attempting to lure the victim into downloading and executing malware. * This campaign abuses Google's | |
| | | | |
blog.ropnop.com
|
|
| | | Write up of my journey figuring out how to host the CLR and execute .NET assemblies from memory in pure Go. | ||