Explore >> Select a destination


You are here

www.welivesecurity.com
| | www.cybereason.com
8.1 parsecs away

Travel
| | Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data...
| | countuponsecurity.com
14.6 parsecs away

Travel
| | Continuing with the analysis of the RIG exploit kit, let's start where we left off and understand the part that contains the malicious Adobe Flash file.We saw, in the last post, that the RIG exploit kit landing page contains heavily obfuscated and encoded JavaScript. One of the things the JavaScript code does is verifying if...
| | securelist.com
8.4 parsecs away

Travel
| | 'ProjectSauron' - a nation-state threat actor attacking state organizations with a unique set of tools for each victim, making traditional indicators of compromise almost useless. The aim of the attacks appears to be mainly cyber-espionage.
| | www.dragos.com
59.2 parsecs away

Travel
| Discover the critical role of specialized cyber threat intelligence in safeguarding OT in the fourth blog of a new fundamentals series from Dragos and SANS ICS.