Roger P.malwaresloth.com·4 hours agoEmbedding Beacon Payloads in PDF FilesWelcome to Malware Sloth's guide on embedding Cobalt Strike payloads in PDF files. This tutorial is designed for security professionals and cybersecurity enthusiasts alike, offering clear, step-by-step instructions on how to effectively incorporate b...DiscussRed TeamMalware
Prajoti Raneprajotirane.hashnode.dev·Apr 13, 2024Unpacking the British Airways Cyberattack: Lessons LearnedUnpacking the British Airways Cyberattack: Lessons Learned In 2018, British Airways, a leading airline, found itself in the eye of a cybersecurity storm when it disclosed a significant cyberattack on its website and mobile app. This blog aims to delv...Discuss#cybersecurity
Stevenstoni.hashnode.dev·Mar 24, 2024What is shellcode and how do we use it to pop shells?C:\Windows\System32 > whoami I'm a Senior Penetration Tester with a keen eye on safeguarding network and Active Directory environments. My qualifications, highlighted by certifications like eJPTv1, PNPT, ICCA, CARTP, CNPen, and CRTE, speak to my expe...Discussmalware development
Roger P.malwaresloth.com·Mar 19, 2024How Malware Generates Millions with Just 60 Lines of Code: A Rust Developer's Guide to Clipboard HijackingIntroduction Welcome back to Malware Sloth Developer Series, where we build the malware that infects thousands of users daily. This guide delves into a particularly simple tactic malware developers employ clipboard hijacking. Clipboard Hijacking Clip...Discuss·33 readsDevelopmentMalware
Roger P.malwaresloth.com·Mar 6, 2024Mastering the Art of UAC Bypass with fodhelper.exe: A Rust Developer's GuideIntroduction Welcome to the inaugural post of Malware Sloth! I'm thrilled to kick things off with some exciting (to me) material that I hope you'll find both informative and intriguing. What better way to launch than with an in-depth exploration of a...Discuss·1 like·123 readsDevelopmentMalwareSloth
Adrianajcyb3r.com·Feb 6, 2024Journey through Cybersecurity: Malware based on system components?I have no idea why, but sometimes acronyms in English are so interesting to me that they draw me deeper... In the previous post, I summarized my Windows Security review, mainly focusing on learning and reviewing PowerShell... and a few others. In the...Discuss#cybersecurity
Adarsh Pratap Singhshivangthakur579.hashnode.dev·Jan 18, 2024Important Question on Cyber Security and Its LawAn Information System is an interconnected set of components used to collect, store, process and transmit data and digital information. It is a collection of hardware, software, network, data, people and process that work together to transform raw da...Discuss·1 like·90 readsapplications security
Aljoscha Irmeraljoschairmer.hashnode.dev·Jan 16, 2024Deciphering the Hidden: The Role of AI in Unmasking Obfuscated MalwareIntroduction In the evolving landscape of cybersecurity, the threat of malware and viruses persists as a significant challenge. These malicious entities often employ obfuscated code - a method designed to mask their true purpose and make analysis dif...Discuss·36 readsObfuscated Code
Maria lopazlopazmaria9.hashnode.dev·Dec 20, 2023A Practical Guide to Effective Threat IntelligenceHighlights: Threat Intelligence involves comprehending a threat’s capabilities, infrastructure, motives, objectives, and available resources. Though often linked with expert analysts, the importance of threat intelligence extends to various securit...Discuss·1 likeDetection techniques
The CyberShield Chroniclescyberinsights.hashnode.dev·Dec 8, 2023LogoFAIL Attacks: UEFI Bootkit Intrusion via Bootup LogosThreat Analysis Multiple vulnerabilities collectively named LogoFAIL have been identified, impacting image-parsing components within the UEFI code across various vendors. Researchers emphasize the potential exploitation of these vulnerabilities to co...DiscussLogoFail