Hey everyone, i just want to know how hard or to what extent is IOS (specifically iphones) is hackable, like i saw a lot of advanced malware like Android Remote access trojans being sold and available even in github like AndroRat and SpyRat and others, are there exemple of malware like this on IOS as for the latest versions like 17 and up, im aware that u may never know with government level malware like pegasus, but i'm talking about easy to get spyware
Читать полностью…Hello guys, how critical do you see it if, for an AV/EDR solution, you have to allow all systems in an isolated environment to communicate with the internet? Are firewall rules sufficient, or should we rather have them run through a dedicated proxy? Thanks
Читать полностью…Because threat actors are shifting their trend to trojans and botnets which are profitable
Читать полностью…I don't know what is good, but you can press on every link on Malpedia to see which one matches your definition of "good"
Читать полностью…New FedBan
Fed: Libra's Empire
FedAdmin: ❤🦦
User: Tac2sec
User ID: 1623379447
Reason: suspicious activity
Hello @Shadow8, welcome to the Malware Research group! Please read the pinned message before you post!
Читать полностью…New FedBan
Fed: Libra's Empire
FedAdmin: Libra
User: LoneWolf-cent
User ID: 1006078940
Reason: if you can only ask and quit responding when actual help is offered, this is not the place for you
Can someone suggest a malware analysis course and/or certificate?
Paid or open source :)
Hello Tarif Elahi, welcome to the Malware Research group! Please read the pinned message before you post!
Читать полностью…New FedBan
Fed: Libra's Empire
FedAdmin: Libra
User: SpiderSec
User ID: 5060252659
Reason: no skids
New FedBan
Fed: Libra's Empire
FedAdmin: ❤🦦
User: Pushpadan Gadhavi
User ID: 1055315355
Reason: creepy activity
Hello Mohamed, welcome to the Malware Research group! Please read the pinned message before you post!
Читать полностью…even .NET or malicious Office documents with obfuscation will frustrate you if you don't have a background in reverse engineering, so go easy on it
Читать полностью….NET samples, malicious Office documents are beginner friendly, more so if you follow the steps listed in the various blogs
Читать полностью…