Qakbot/Qakbot_BB25_24.04.2023.txt at main · pr0xylife/Qakbot · GitHub
https://github.com/pr0xylife/Qakbot/blob/main/Qakbot_BB25_24.04.2023.txt![Qakbot/Qakbot_BB25_24.04.2023.txt at main · pr0xylife/Qakbot · GitHub](/image/screenshot/b3adb403a9f0bfa03c2e848f186141b6.png)
Hacker Group Names Are Now Absurdly Out of Control | WIRED
https://www.wired.com/story/hacker-naming-schemes-spandex-tempest/![Hacker Group Names Are Now Absurdly Out of Control | WIRED](/image/screenshot/05cd35e57730be494c5ec27441813ef6.png)
Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991
https://qriousec.github.io/post/vbox-pwn2own-2023/![Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991](/image/screenshot/ac61f1d9d43295f52f6f6580dbb39a53.png)
HITBAMS – Your Not so “Home” Office – Soho Hacking at Pwn2Own | NCC Group Research Blog | Making the world safer and more secure
https://research.nccgroup.com/2023/04/24/hitbams-your-not-so-home-office-soho-hacking-at-pwn2own/![HITBAMS – Your Not so “Home” Office – Soho Hacking at Pwn2Own | NCC Group Research Blog | Making the world safer and more secure](/image/screenshot/c6fa7953b611dc866ef149214283f770.png)
Introducing VirusTotal Code Insight: Empowering threat analysis with generative AI ~ VirusTotal Blog
https://blog.virustotal.com/2023/04/introducing-virustotal-code-insight.html![Introducing VirusTotal Code Insight: Empowering threat analysis with generative AI ~ VirusTotal Blog](/image/screenshot/067be8dc87ba9e5eb5f3b09559da9cf3.png)
Hackers can breach networks using data on resold corporate routers
https://www.bleepingcomputer.com/news/security/hackers-can-breach-networks-using-data-on-resold-corporate-routers/![Hackers can breach networks using data on resold corporate routers](/image/screenshot/66486fc0baaf9629693ec14630bd2292.png)
Attacking O365 with TeamFiltration Part 2 - Enumeration - YouTube
https://youtu.be/YyuxEuzQa9k![Attacking O365 with TeamFiltration Part 2 - Enumeration - YouTube](/image/screenshot/817b44e9ba77bd1dcb6eb094829b5c65.png)
Tomiris called, they want their Turla malware back | Securelist
https://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552/![Tomiris called, they want their Turla malware back | Securelist](/image/screenshot/d11058fea687eff66fca7a90f2189989.png)
Detecting and decrypting Sliver C2 – a threat hunter's guide - Immersive Labs
https://www.immersivelabs.com/blog/detecting-and-decrypting-sliver-c2-a-threat-hunters-guide/![Detecting and decrypting Sliver C2 – a threat hunter's guide - Immersive Labs](/image/screenshot/edef1c2a1ab5df199a00028968166638.png)
CodeQL query to detect RCE via ZipSlip - $5,500 bounty from GitHub Security Lab - YouTube
https://youtu.be/F95U912u7OQ![CodeQL query to detect RCE via ZipSlip - $5,500 bounty from GitHub Security Lab - YouTube](/image/screenshot/376e0b369616e161dcf908bed40ec12f.png)
Andy Greenberg ([email protected]) on Twitter: "Cybersecurity industry, we need to talk. Is it truly a good idea to call Iranian hackers targeting US seaports, energy and transit systems “Mint Sandstorm”? Or “Charming Kitten”? I wrote (ranted) about the increasingly absurd sprawl of hacker group names. https://t.co/d5nFai8QoQ" / Twitter
https://twitter.com/a_greenberg/status/1650168109431414788![Andy Greenberg (agreenberg@infosec.exchange) on Twitter: "Cybersecurity industry, we need to talk. Is it truly a good idea to call Iranian hackers targeting US seaports, energy and transit systems “Mint Sandstorm”? Or “Charming Kitten”? I wrote (ranted) about the increasingly absurd sprawl of hacker group names. https://t.co/d5nFai8QoQ" / Twitter](/image/screenshot/5bec23575586cdc13611a68e7c19e1c5.png)
Malware-Analysis/Indirect Syscalls.md at main · dodo-sec/Malware-Analysis · GitHub
https://github.com/dodo-sec/Malware-Analysis/blob/main/Cobalt%20Strike/Indirect%20Syscalls.md![Malware-Analysis/Indirect Syscalls.md at main · dodo-sec/Malware-Analysis · GitHub](/image/screenshot/bc369db6e759f1f32f9d769bab4a4109.png)
APC warns of critical unauthenticated RCE flaws in UPS software
https://www.bleepingcomputer.com/news/security/apc-warns-of-critical-unauthenticated-rce-flaws-in-ups-software/![APC warns of critical unauthenticated RCE flaws in UPS software](/image/screenshot/bff706992d03fab4847ea309a39e3758.png)