Интересная уязвимость в Microsoft Visual Studio C++ Compiler https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0546
Avoid AV with DLL Side-Loading for fun and advantage with Cobaltstrike
https://medium.com/@viniciuskmax/burlando-antivirus-com-dll-side-loading-por-diversão-e-vantagem-parte-2-ko-d0b40629d810
https://medium.com/@viniciuskmax/burlando-antivirus-com-dll-side-loading-por-diversão-e-vantagem-parte-2-ko-d0b40629d810
Medium
Burlando antivirus com DLL Side-Loading por diversão e vantagem — parte 2: KO
Alguns meses atrás, escrevi sobre o ataque de DLL Side-Loading, mostrando um exemplo real envolvendo um binário legítimo e digitalmente…
https://www.omscs.gatech.edu/cs-6262-network-security - курс CS 6262 доступен на Udacity: https://classroom.udacity.com/courses/ud199
Python and Machine Learning: How to use algorithms to create yara rules with a malware zoo for hunting https://2018.pass-the-salt.org/files/talks/14-python-and-ml.pdf
We have seen machine learning is not magic, a work of featuring must be done including the of the dataset.
Here, our dataset is very heterogeneous with a big cluster of EquationGroup, and others clusters with few malwares
The machine learning is useful to make a first filter to clusterize a big dataset because the algorithms have been thought to be scalable contrary to algorithms which compare signatures. (ssdeep,impfuzzy,machoc...)