|
You are here |
www.welivesecurity.com | ||
| | | | |
polaryse.github.io
|
|
| | | | | Analysis of 'WannaSmile' ransomware using dnSpy to pull apart and understand the behaviour and crypto functions used by this binary to encrypt machines. | |
| | | | |
cyble.com
|
|
| | | | | Discover how the Mustang Panda APT group targets entities using sophisticated malware, including LNK files and DLL sideloading, in recent campaigns. | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | Talos also discovered a new PowerShell command-line argument embedded in the LNK file to bypass anti-virus products and download the final payload into the victims' host. | |
| | | | |
securitybrief.com.au
|
|
| | | Fortinet and NAB host second annual Cyber Codefest in Melbourne, aiming to narrow the cybersecurity skills gap. | ||