Skip Navigation

Posts
41
Comments
0
Joined
2 yr. ago

BlueTeamSec @infosec.pub

Case Study: cracking a global Adversary-In-The-Middle campaign using a threat intelligence toolkit

BlueTeamSec @infosec.pub

Automating acquisition for incident response

BlueTeamSec @infosec.pub

Security Threat Insights Report Q1 2023 - notable malware campaigns, trends and techniques identified from customer telemetry in calendar Q1 2023

BlueTeamSec @infosec.pub

Shampoo: A New ChromeLoader Campaign

BlueTeamSec @infosec.pub

OnlyDcRatFans: Malware Distributed Using Explicit Lures of OnlyFans Pages and Other Adult Content

BlueTeamSec @infosec.pub

Cyber ​​attack by group UAC-0057 (GhostWriter) against the state organization of Ukraine using PicassoLoader and Cobalt Strike Beacon (CERT-UA#6852) - use Chrome translate

BlueTeamSec @infosec.pub

Evasive File Smuggling with Skyhook

BlueTeamSec @infosec.pub

Threat activity and vulnerabilities in Indonesia, Malaysia, Philippines, and Thailand | APNIC Blog

BlueTeamSec @infosec.pub

Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine

BlueTeamSec @infosec.pub

Hijacking S3 Buckets: New Attack Technique

BlueTeamSec @infosec.pub

Russian National Arrested and Charged with Conspiring to Commit LockBit Ransomware Attacks Against U.S. and Foreign Businesses

BlueTeamSec @infosec.pub

Video-Based Cryptanalysis: Exploiting a Video Camera's Rolling Shutter to Recover Secret Keys from Devices Using Video of Their Power LED - demonstrate the application of video-based cryptanalysis by

BlueTeamSec @infosec.pub

한글 문서 파일을 위장한 악성코드(Kimsuky) - Malicious code disguised as a Hangul document file (Kimsuky)

BlueTeamSec @infosec.pub

다양한 주제를 이용하여 CHM 악성코드를 유포 중인 Kimsuky - Kimsuky spreading CHM malware using various topics

BlueTeamSec @infosec.pub

BypassAV: This map lists the essential techniques to bypass anti-virus and EDR

BlueTeamSec @infosec.pub

RunInSandbox: a quick way to run/extract files in Windows Sandbox with a right-click on a file

BlueTeamSec @infosec.pub

MSSQL linked servers: abusing ADSI for password retrieval

BlueTeamSec @infosec.pub

PoCs to help learning how to get SYSTEM privilege on Windows

BlueTeamSec @infosec.pub

Microsoft Response to Layer 7 Distributed Denial of Service (DDoS) Attacks

BlueTeamSec @infosec.pub

ransomware-descendants: A repository dedicated to tracking ransomware families based on leaked builders.