When the Cybersecurity and Infrastructure Security Agency (CISA) issues a rare Malware Analysis Report (MAR), security professionals across the Windows and wider enterprise world take notice. In late March 2025, CISA published such a report for a new malware variant dubbed RESURGE, associated...
Anyone relying on smooth, uninterrupted digital communication probably felt an unpleasant jolt between April 22 and April 24, when Microsoft's Exchange Online took it upon itself to flag perfectly legitimate Adobe emails as spam—because who doesn't enjoy a little surprise inbox purgatory before...
adobe email
ai in security
automation risks
business productivity
cloud security
cybersecurity
defender xdr
digital communication
email bugs
email management
email privacy
email security
false positives
it support
machine learning errors
malwareanalysis
microsoft exchange
security automation
security incidents
spam filtering
Unmasking the Upgraded Tycoon2FA Phishing Kit
In recent months, cybersecurity experts have seen a concerning evolution in phishing-as-a-service (PhaaS) tools, with Tycoon2FA emerging as one of the most sophisticated threats. Once infamous for bypassing multi-factor authentication (MFA) on...
Summary
The advisory clarifies that cyber operations carried out by Unit 29155 are characterized by espionage, sabotage, and the intention to inflict reputational damage. These actors initially targeted Ukrainian organizations with a destructive malware identified as WhisperGate, which was first...
The ‘Joker’ virus has been around since 2017, it has been a recurring thread to Android OS to this day. You’ve probably heard of this virus on more than one occasion. Considering that it surfaced two times in the last couple of months, we’ve decided to give you more detailed information about...
Original release date: February 17, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
This joint advisory is the result of analytic efforts...
Original release date: January 8, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
This Alert is a companion alert to Link Removed...
Original release date: May 29, 2018
Systems Affected
Network systems
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS and FBI...
Original release date: November 14, 2017
Systems Affected
Network systems
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS...
Original release date: November 14, 2017
Systems Affected
Network systems
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS...
command and control
cybersecurity
dhs
fallchill
fbi
hidden cobra
incident response
indicators of compromise
ip addresses
malwaremalwareanalysismalware detection
mitigation techniques
network defense
network security
north korea
remote administration tool
system information
threat report
tls communications
I personally need to generate file hashes quite a bit for verifying file integrity as well as analyzing malware samples. I really wanted to have code that I had complete control over so I wrote a short powershell script and some minor registry editing to set this up.
Registry Change
If you...