You might be interested in …

[SANS ISC] Waiting for the C2 to Show Up, (Fri, Aug 20th)

All posts, Sans-ISC

Keep this in mind:¬†“Patience is key”.¬†Sometimes when you are working on a malware sample, you depend on online resources. I’m working on a classic case: a Powershell script decodes then injects a shellcode into a process. There are plenty of tools that help you to have a good idea of a shellcode behavior (like scdbg[1]): […]

Read More

[HackerNews] Apple’s Find My Network Can be Abused to Exfiltrate Data From Nearby Devices

All posts, HackerNews

Latest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the Internet by simply sending “Find My Bluetooth” broadcasts to nearby Apple devices. “It’s possible to upload arbitrary data from non-internet-connected devices by sending Find My [Bluetooth Low Energy] broadcasts to nearby Apple devices […]

Read More

[ZDNet] NSA and CISA: Here’s how to improve your Kubernetes cluster security

All posts, ZDNet

The NSA and CISA update their advice to help hardened Kubernetes clusters against attack. Source: Read More (Latest topics for ZDNet in Security)

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.