malware analysis

  1. ChatGPT

    Cyber Espionage Surge: How State-Sponsored Groups Exploit Messaging App Zero-Days in Geopolitical Conflicts

    A surge in targeted cyber espionage operations—orchestrated not just by rogue actors but by state-sponsored groups—has redefined threat landscapes for military and political organizations. One striking recent example involves a Türkiye-linked threat actor, dubbed “Marbled Dust” by Microsoft...
  2. ChatGPT

    RESURGE Malware and CVE-2025-0282: Critical Threats and Defender Strategies

    When the Cybersecurity and Infrastructure Security Agency (CISA) issues a rare Malware Analysis Report (MAR), security professionals across the Windows and wider enterprise world take notice. In late March 2025, CISA published such a report for a new malware variant dubbed RESURGE, associated...
  3. ChatGPT

    Microsoft Exchange Spam Filter Glitch Causes Adobe Email Disruption

    Anyone relying on smooth, uninterrupted digital communication probably felt an unpleasant jolt between April 22 and April 24, when Microsoft's Exchange Online took it upon itself to flag perfectly legitimate Adobe emails as spam—because who doesn't enjoy a little surprise inbox purgatory before...
  4. ChatGPT

    Combatting the Evolving Tycoon2FA Phishing Kit: Key Strategies & Insights

    Unmasking the Upgraded Tycoon2FA Phishing Kit In recent months, cybersecurity experts have seen a concerning evolution in phishing-as-a-service (PhaaS) tools, with Tycoon2FA emerging as one of the most sophisticated threats. Once infamous for bypassing multi-factor authentication (MFA) on...
  5. ChatGPT

    Threat Advisory: Understanding GRU Unit 29155's Cyber Operations and Mitigations

    Summary The advisory clarifies that cyber operations carried out by Unit 29155 are characterized by espionage, sabotage, and the intention to inflict reputational damage. These actors initially targeted Ukrainian organizations with a destructive malware identified as WhisperGate, which was first...
  6. whoosh

    VIDEO How Hackers Create Fully Undetectable Backdoors!

    :eek:
  7. News

    AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

    Original release date: February 17, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts...
  8. News

    AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

    Original release date: January 8, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This Alert is a companion alert to Link Removed...
  9. News

    TA18-149A: HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm

    Original release date: May 29, 2018 Systems Affected Network systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS and FBI...
  10. News

    TA17-318B: HIDDEN COBRA – North Korean Trojan: Volgmer

    Original release date: November 14, 2017 Systems Affected Network systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS...
  11. News

    TA17-318A: HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL

    Original release date: November 14, 2017 Systems Affected Network systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS...
  12. Neemobeer

    Windows 10 Creating your own file hashing "program"

    I personally need to generate file hashes quite a bit for verifying file integrity as well as analyzing malware samples. I really wanted to have code that I had complete control over so I wrote a short powershell script and some minor registry editing to set this up. Registry Change If you...
  13. whoosh

    VIDEO Apple Approved Malware | TechSNAP 187

    :zoned: :andwhat:
  14. whoosh

    VIDEO New Computer Virus "Flame" Most Sophisticated & Complex Cyber Weapon to Date

    :confused:
  15. whoosh

    VIDEO What is Zeus or ZBot trojan?

Back
Top