Order of Six Angles
Silver Fox campaign targeting chinese gov and financial sector Link1 Link2
Скачать образцы из статьи (спасибо vxug)
Telegram
Files
A Deep Dive into the OceanLotus Adversary Emulation for macOS & Linux
https://medium.com/mitre-engenuity/a-deep-dive-into-the-oceanlotus-adversary-emulation-for-macos-linux-26e521502866
https://medium.com/mitre-engenuity/a-deep-dive-into-the-oceanlotus-adversary-emulation-for-macos-linux-26e521502866
Medium
A Deep Dive into the OceanLotus Adversary Emulation for macOS & Linux
Written by L. Piper and Cat Self.
Beginners Guide to Building a Hardware Hacking Lab
https://voidstarsec.com/hw-hacking-lab/vss-lab-guide
https://voidstarsec.com/hw-hacking-lab/vss-lab-guide
VoidStar Security Wiki
VSS Hardware Hacking Wiki and Blog Entries
“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts
https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16?gi=9da8f59fe944
https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16?gi=9da8f59fe944
guard.io
“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts
Order of Six Angles
Photo
а то бля заебало про одно байтоёбство читать 😂
BOOMSLANG Mobile fraud family analysis
https://www.liansecurity.com/#/main/news/mlRmJIwB203zX1eeD8-r/detail
https://www.liansecurity.com/#/main/news/mlRmJIwB203zX1eeD8-r/detail
Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell | CypherCon 6.0
https://www.youtube.com/watch?v=AOWFM-JhW3g&list=PLUC_sTnMl8NxZqs4b2Rt8VygLaquV5vY_
https://www.youtube.com/watch?v=AOWFM-JhW3g&list=PLUC_sTnMl8NxZqs4b2Rt8VygLaquV5vY_
YouTube
Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell | CypherCon 6.0
(S6:E57) Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell - CypherCon 6.0 - Wisconsin
Secret Handshake A Mutual TLS Based C2 Communication Channel
One of the goals of malware command & control (C2) communication is to blend into…
Secret Handshake A Mutual TLS Based C2 Communication Channel
One of the goals of malware command & control (C2) communication is to blend into…