You are here |
intezer.com | ||
| | | |
blog.talosintelligence.com
|
|
| | | | Cisco Talos discovered a new attack framework including a command and control (C2) tool called "Alchimist" and a new malware "Insekt" with remote administration capabilities. | |
| | | |
blog.phylum.io
|
|
| | | | Phylum continues to discover malware polluting open-source ecosystems. In this blog post, we take a deep-dive into an npm package trying to masquerade as code profiler which actually installs several malicious scripts including a cryptocurrency and credential stealer. Curiously, the attacker attempted to hide the malicious code in a test | |
| | | |
objective-see.com
|
|
| | | | ||
| | | |
goggleheadedhacker.com
|
|
| | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. |