You might be interested in …

Daily NCSC-FI news followup 2019-06-25

Operation Soft Cell a worldwide campaign against telecommunications providers In 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers carried out by a threat actor using tools and techniques commonly associated with the Chinese-affiliated threat actor APT10. This multi-wave attacks focused on obtaining data of specific, high-value targets and […]

Read More

[SANS ISC] Video: oledump Cheat Sheet, (Sun, Jun 20th)

All posts, Sans-ISC

I did create a SANS cheat sheet for Here is a short video where I go over the cheat sheet and give some simple demos: Didier Stevens Senior handler Microsoft MVP (c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License. Source: Read More (SANS Internet Storm Center, InfoCON: green)

Read More

[ZDNet] Hackers used never-before-seen wiper in recent attack on Iranian train system: report

All posts, ZDNet

SentinelOne analysts were able to recreate the July 9 attack and identify the threat actor behind it. Source: Read More (Latest topics for ZDNet in Security)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.