03/29

Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests” – Krebs on Security

https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/
Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests” – Krebs on Security

Tweet / Twitter

https://twitter.com/BillDemirkapi/status/1508610588200607746
Tweet / Twitter

HTTPVoid Research | HTTPVoid is a research oriented team of computer security.

http://httpvoid.com/?p=Ruby-deserialization-gadget-on-rails.md
HTTPVoid Research | HTTPVoid is a research oriented team of computer security.

Forged in Fire: A Survey of MobileIron Log4Shell Exploitation | Mandiant

https://www.mandiant.com/resources/mobileiron-log4shell-exploitation
Forged in Fire: A Survey of MobileIron Log4Shell Exploitation | Mandiant

MalwareBazaar | Browse malware samples

https://bazaar.abuse.ch/sample/b391b28e6eeb24283524da11d8126873d55241bb49f506955b07b39712bb1616/
MalwareBazaar | Browse malware samples

Lapsus$ found a spreadsheet of accounts as they breached Okta, documents show | TechCrunch

https://techcrunch.com/2022/03/28/lapsus-passwords-okta-breach/
Lapsus$ found a spreadsheet of accounts as they breached Okta, documents show | TechCrunch

InsanityBit on Twitter: "Update your threat models https://t.co/TcOM9biLUX" / Twitter

https://twitter.com/insanitybit/status/1508797314973851654
InsanityBit on Twitter: "Update your threat models https://t.co/TcOM9biLUX" / Twitter

Dragos Inc. - Senior Industrial Incident Responder

https://jobs.lever.co/dragos/34193654-aa29-4897-90fa-11706ecadeb3
Dragos Inc. - Senior Industrial Incident Responder

ABC-Code Execution for Veeam - MDSec

https://www.mdsec.co.uk/2022/03/abc-code-execution-for-veeam/
ABC-Code Execution for Veeam - MDSec

PlugX: A Talisman to Behold

https://trellix.com/en-us/about/newsroom/stories/threat-labs/plugx-a-talisman-to-behold.html
PlugX: A Talisman to Behold

Emotet/e4_emotet_29.03.2022.txt at main · pr0xylife/Emotet · GitHub

https://github.com/pr0xylife/Emotet/blob/main/e4_emotet_29.03.2022.txt
Emotet/e4_emotet_29.03.2022.txt at main · pr0xylife/Emotet · GitHub

| Job Preference

http://www.jobpreference.com
| Job Preference

COFFLoader: Building your own in memory loader or how to run BOFs - TrustedSec

https://www.trustedsec.com/blog/coffloader-building-your-own-in-memory-loader-or-how-to-run-bofs/
COFFLoader: Building your own in memory loader or how to run BOFs - TrustedSec

Use of Russian technology products and services following... - NCSC.GOV.UK

https://www.ncsc.gov.uk/blog-post/use-of-russian-technology-products-services-following-invasion-ukraine
Use of Russian technology products and services following... - NCSC.GOV.UK

A Large-Scale Supply Chain Attack Distributed Over 800 Malicious NPM Packages

https://thehackernews.com/2022/03/a-threat-actor-dubbed-red-lili-has-been.html
A Large-Scale Supply Chain Attack Distributed Over 800 Malicious NPM Packages

New Hacking Campaign by Transparent Tribe Hackers Targeting Indian Officials

https://thehackernews.com/2022/03/new-hacking-campaign-by-transparent.html
New Hacking Campaign by Transparent Tribe Hackers Targeting Indian Officials

Ukraine dismantles 5 disinformation bot farms, seizes 10,000 SIM cards

https://www.bleepingcomputer.com/news/security/ukraine-dismantles-5-disinformation-bot-farms-seizes-10-000-sim-cards/
Ukraine dismantles 5 disinformation bot farms, seizes 10,000 SIM cards

Experts Detail Virtual Machine Used by Wslink Malware Loader for Obfuscation

https://thehackernews.com/2022/03/experts-detail-virtual-machine-used-by.html
Experts Detail Virtual Machine Used by Wslink Malware Loader for Obfuscation

HowToHunt/JWT.md at master · KathanP19/HowToHunt · GitHub

https://github.com/KathanP19/HowToHunt/blob/master/JWT/JWT.md
HowToHunt/JWT.md at master · KathanP19/HowToHunt · GitHub

Offensive_tools/Citrix at main · post-cyberlabs/Offensive_tools · GitHub

https://github.com/post-cyberlabs/Offensive_tools/tree/main/Citrix
Offensive_tools/Citrix at main · post-cyberlabs/Offensive_tools · GitHub

Microsoft Exchange targeted for IcedID reply-chain hijacking attacks

https://www.bleepingcomputer.com/news/security/microsoft-exchange-targeted-for-icedid-reply-chain-hijacking-attacks/
Microsoft Exchange targeted for IcedID reply-chain hijacking attacks

SOCKS4a Proxy in C# – Rasta Mouse

https://rastamouse.me/socks4a-proxy-in-csharp/
SOCKS4a Proxy in C# – Rasta Mouse

Mars Stealer: Exclusive New Threat Research

https://blog.morphisec.com/threat-research-mars-stealer
Mars Stealer: Exclusive New Threat Research

Intrusion Truth - Five Years of Naming and Shaming China’s Spies

https://zetter.substack.com/p/interview-with-intrusion-truth
Intrusion Truth - Five Years of Naming and Shaming China’s Spies