|
You are here |
blog.cy.md | ||
| | | | |
joeyreyes.dev
|
|
| | | | | Happy new year! I'm kicking 2022 off with a post that has been in my queue for quite some time, an exploration of strict mode in JavaScript | |
| | | | |
objective-see.org
|
|
| | | | | [AI summary] The analysis of the file iWebUpdate reveals it is likely malware. The binary is capable of downloading and executing arbitrary payloads from a remote server, indicating it is a persistent backdoor. Key findings include its command and control server (iwebservicescloud.com), which has ties to malicious actors, and its persistence mechanism via a LaunchAgent. The binary is unsigned, lacks online presence, and its network activity is suspicious. Detection methods include monitoring for persistence, network traffic, and using tools like BlockBlock and KnockKnock. | |
| | | | |
blog.spreendigital.de
|
|
| | | | | ||
| | | | |
www.michaelcrump.net
|
|
| | | Learn how to deploy Azure Functions with Visual Studio Code | ||