Discover how Luna Moth Ransomware uses false subscription scams to exploit victims. Learn to protect your data with insights from Sygnia.| Sygnia
Overview Bumblebee malware has been an initial access tool used by threat actors since late 2021. In 2023 the malware was first reported as using SEO poisoning as a delivery mechanism. Recently in …| The DFIR Report
Earlier I had written a post on how to detect WiFi leechers on your network and mentioned a couple of smartphone apps you could use to scan your home network. The apps do a pretty good job of scanning your network automatically and giving you some details on each device. I didn't go into much| Online Tech Tips - Computer Tips from a Computer Guy
Key Takeaways Initial access was via a resume lure as part of a TA4557/FIN6 campaign. The threat actor abused LOLbins like ie4uinit.exe and msxsl.exe to run the more_eggs malware. Cobalt Strike and…| The DFIR Report
Key Takeaways In October 2023, we observed an intrusion that began with a spam campaign, distributing a forked IcedID loader. The threat actor used Impacket’s wmiexec and RDP to install Scree…| The DFIR Report
In 2022, The DFIR Report observed an increase in the adversarial usage of Remote Management and Monitoring (RMM) tools. When compared to post-exploitation channels that heavily rely on terminals, s…| The DFIR Report
In the last years my team at r-tec was confronted with many different company environments, in which we had to search for vulnerabilities and misconfiguratio...| s3cur3th1ssh1t.github.io