Nguyễn Văn TrungforFIS Securityblog.fiscybersec.com·Jul 24, 2024Sự cố CrowdStrike bị lợi dụng: Cảnh báo về phishing và phát tán mã độc1. Thông tin chi tiết. Vào thứ Sáu vừa qua ngày 19 tháng 7, công ty bảo mật CrowdStrike đã phát hành một bản cập nhật cấu hình sensor định kỳ, nhưng không may đã gây ra lỗi logic và dẫn đến lỗi màn hình xanh chết chóc (BSOD) trên các hệ thống Windows...DiscussNewsletterscrowdstrke
Achal Tiwariachaltiwari.hashnode.dev·Jul 22, 2024ShellCode 1.0Hey there! Today, we're diving into the fascinating and somewhat intimidating world of shellcode. If you've ever wondered how hackers manage to take control of a compromised machine, shellcode is often a big part of the answer. Let's break it down to...DiscussMalware
Burpburp.hashnode.dev·Jul 9, 2024Escáner malware para Android: HypatiaSi bien la preocupación por la privacidad es algo que afortunadamente está en continuo auge, hay otro aspecto al que también conviene prestarle la atención que merece. Me refiero a la seguridad en nuestros terminales móviles. Aquí cabe recalcar el es...Discusshypatia
Reza RashidiforRedTeamReciperedteamrecipe.com·May 30, 2024Assembly for Hackers"Assembly Unleashed: A Hacker's Handbook" is a definitive resource tailored specifically for hackers and security researchers seeking to master the art of assembly programming language. Authored by seasoned practitioners in the field, this book offer...Discuss·8 likes·8.0K readsAssembly
Polkam Srinidhinidhiblog.hashnode.dev·May 16, 2024Module 2: Types of Malware & Cyber LandspaceSpyware Designed to track and spy on you, spyware monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking detail...DiscussMalware
Roger P.malwaresloth.com·Apr 17, 2024Embedding Beacon Payloads in PDF FilesWelcome to Malware Sloth's guide on embedding Cobalt Strike payloads in PDF files. This tutorial is designed for security professionals and cybersecurity enthusiasts alike, offering clear, step-by-step instructions on how to effectively incorporate b...Discuss·145 readsRed TeamMalware
Prajoti Raneprajotirane.hashnode.dev·Apr 13, 2024Unpacking the British Airways Cyberattack: Lessons LearnedUnpacking the British Airways Cyberattack: Lessons Learned In 2018, British Airways, a leading airline, found itself in the eye of a cybersecurity storm when it disclosed a significant cyberattack on its website and mobile app. This blog aims to delv...Discuss#cybersecurity
Stevenstoni.hashnode.dev·Mar 24, 2024What is shellcode and how do we use it to pop shells?C:\Windows\System32 > whoami I'm a Senior Penetration Tester with a keen eye on safeguarding network and Active Directory environments. My qualifications, highlighted by certifications like eJPTv1, PNPT, ICCA, CARTP, CNPen, CRTE, and CRTO speak to my...Discuss·1 like·57 readsmalware development
Roger P.malwaresloth.com·Mar 19, 2024How Malware Generates Millions with Just 60 Lines of Code: A Rust Developer's Guide to Clipboard HijackingIntroduction Welcome back to Malware Sloth Developer Series, where we build the malware that infects thousands of users daily. This guide delves into a particularly simple tactic malware developers employ clipboard hijacking. Clipboard Hijacking Clip...Discuss·43 readsDevelopmentMalware
Roger P.malwaresloth.com·Mar 6, 2024Mastering the Art of UAC Bypass with fodhelper.exe: A Rust Developer's GuideIntroduction Welcome to the inaugural post of Malware Sloth! I'm thrilled to kick things off with some exciting (to me) material that I hope you'll find both informative and intriguing. What better way to launch than with an in-depth exploration of a...Discuss·1 like·159 readsDevelopmentMalwareSloth