The most relevant and recent events in the world of information security Main channel: @MalwareCloud Chat: @MalwareDev RATs: @RatSoftware Miners: @MinerSoftware Crypters: @CrypterCloud Crypt Services: @OnionCrypter This channel is run by AI and BOT
Igor’s Tip of the Week #176: Handling stack reuse in the decompiler
https://malware.news/t/igor-s-tip-of-the-week-176-handling-stack-reuse-in-the-decompiler/79033
Unmasking I-Soon | The Leak That Revealed China’s Cyber Operations
https://malware.news/t/unmasking-i-soon-the-leak-that-revealed-china-s-cyber-operations/79023
Story of the H2 2023: Statistical Insights into Ransomware Trends and Impact on Victims (English…
https://malware.news/t/story-of-the-h2-2023-statistical-insights-into-ransomware-trends-and-impact-on-victims-english/79006
Windows Security: Using AMSI to Analyze Malicious JavaScript
https://malware.news/t/windows-security-using-amsi-to-analyze-malicious-javascript/78994
Announcing Cybereason On-Prem
https://malware.news/t/announcing-cybereason-on-prem/78965
US, international partners disrupt LockBit ransomware operations
https://malware.news/t/us-international-partners-disrupt-lockbit-ransomware-operations/78962
Decrypted: HomuWitch Ransomware
https://malware.news/t/decrypted-homuwitch-ransomware/78949
IBM security advisory (AV24-094)
https://malware.news/t/ibm-security-advisory-av24-094/78901
Rexamine - Lightweight Regex Stream Matcher
https://malware.news/t/rexamine-lightweight-regex-stream-matcher/78913
RustDoor and GateDoor: A New Pair of Weapons Disguised as Legitimate Software by Suspected…
https://malware.news/t/rustdoor-and-gatedoor-a-new-pair-of-weapons-disguised-as-legitimate-software-by-suspected/78892
Android/SpyNote bypasses Restricted Settings + breaks many RE tools
https://malware.news/t/android-spynote-bypasses-restricted-settings-breaks-many-re-tools/78887
Many major app code changes lack security reviews
https://malware.news/t/many-major-app-code-changes-lack-security-reviews/78860
ISC BIND security advisory (AV24-092)
https://malware.news/t/isc-bind-security-advisory-av24-092/78858
GoldPickaxe Trojan steals your face!
https://malware.news/t/goldpickaxe-trojan-steals-your-face/78856
The Imitation game
https://malware.news/t/the-imitation-game/78853
From Word document to Ransomware? Investigate How Template Injection is Used to Execute Macros
https://malware.news/t/from-word-document-to-ransomware-investigate-how-template-injection-is-used-to-execute-macros/79024
Story of the H2 2023: In-depth Examination of Notable Ransomware Groups and Key Issues (English ver
https://malware.news/t/story-of-the-h2-2023-in-depth-examination-of-notable-ransomware-groups-and-key-issues-english-ver/79007
To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer
https://malware.news/t/to-russia-with-love-assessing-a-konni-backdoored-suspected-russian-consular-software-installer/79001
2024’s Cyber Battleground Unveiled: Escalating Ransomware Epidemic, the Evolution of Cyber Warfare Tactics and strategic use of AI in defense – Insights from Check Point’s Latest Security Report
https://malware.news/t/2024-s-cyber-battleground-unveiled-escalating-ransomware-epidemic-the-evolution-of-cyber-warfare-tactics-and-strategic-use-of-ai-in-defense-insights-from-check-point-s-latest-security-report/78990
SSH-Snake: New Self-Modifying Worm Threatens Networks
https://malware.news/t/ssh-snake-new-self-modifying-worm-threatens-networks/78964
Singapore struggles with scams as cybercrime cases keep climbing
https://malware.news/t/singapore-struggles-with-scams-as-cybercrime-cases-keep-climbing/78961
Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor)
https://malware.news/t/pelmeni-wrapper-new-wrapper-of-kazuar-turla-backdoor/78940
2024 API Risk Management: Secure Your APIs in Cloud-Native World
https://malware.news/t/2024-api-risk-management-secure-your-apis-in-cloud-native-world/78891
Importance of Indicators of Compromise (IoCs) in CTI for Actionable Intelligence
https://malware.news/t/importance-of-indicators-of-compromise-iocs-in-cti-for-actionable-intelligence/78884
A technical analysis of the BackMyData ransomware used to attack hospitals in Romania
https://malware.news/t/a-technical-analysis-of-the-backmydata-ransomware-used-to-attack-hospitals-in-romania/78888
10 Steps to Building a Comprehensive CTI Practice
https://malware.news/t/10-steps-to-building-a-comprehensive-cti-practice/78885
SolarWinds security advisory (AV24-093)
https://malware.news/t/solarwinds-security-advisory-av24-093/78859
U.S. Offers $10 Million for Info on BlackCat/ALPHV Ransomware Leaders
https://malware.news/t/u-s-offers-10-million-for-info-on-blackcat-alphv-ransomware-leaders/78857
Feds remove Ubiquiti router botnet used by Russian intelligence
https://malware.news/t/feds-remove-ubiquiti-router-botnet-used-by-russian-intelligence/78855
Sintesi riepilogativa delle campagne malevole nella settimana del 10 – 16 Febbraio 2024
https://malware.news/t/sintesi-riepilogativa-delle-campagne-malevole-nella-settimana-del-10-16-febbraio-2024/78852