You are here |
www.welivesecurity.com | ||
| | | |
www.cybereason.com
|
|
| | | | Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data... | |
| | | |
countuponsecurity.com
|
|
| | | | Continuing with the analysis of the RIG exploit kit, let's start where we left off and understand the part that contains the malicious Adobe Flash file.We saw, in the last post, that the RIG exploit kit landing page contains heavily obfuscated and encoded JavaScript. One of the things the JavaScript code does is verifying if... | |
| | | |
securelist.com
|
|
| | | | 'ProjectSauron' - a nation-state threat actor attacking state organizations with a unique set of tools for each victim, making traditional indicators of compromise almost useless. The aim of the attacks appears to be mainly cyber-espionage. | |
| | | |
www.dragos.com
|
|
| | Discover the critical role of specialized cyber threat intelligence in safeguarding OT in the fourth blog of a new fundamentals series from Dragos and SANS ICS. |