08/04

On Detection: Tactical to Functional | by Jared Atkinson | Posts By SpecterOps Team Members

https://posts.specterops.io/on-detection-tactical-to-functional-37ddcd75234b
On Detection: Tactical to Functional | by Jared Atkinson | Posts By SpecterOps Team Members

Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations | Mandiant

https://www.mandiant.com/resources/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against?1
Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations | Mandiant

Woody RAT: A new feature-rich malware spotted in the wild | Malwarebytes Labs

https://blog.malwarebytes.com/threat-intelligence/2022/08/woody-rat-a-new-feature-rich-malware-spotted-in-the-wild/
Woody RAT: A new feature-rich malware spotted in the wild | Malwarebytes Labs

Traffic Light Protocol (TLP)

https://www.first.org/tlp/
Traffic Light Protocol (TLP)

Introducing the Azure Threat Research Matrix - Microsoft Tech Community

https://techcommunity.microsoft.com/t5/security-compliance-and-identity/introducing-the-azure-threat-research-matrix/ba-p/3584976
Introducing the Azure Threat Research Matrix - Microsoft Tech Community

Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware

https://unit42.paloaltonetworks.com/bumblebee-malware-projector-libra/
Flight of the Bumblebee: Email Lures and File Sharing Services Lead to Malware

"Windows Kernel Debugging, Internals, and Exploitation" Pre-Class Survey - Beta

https://docs.google.com/forms/d/e/1FAIpQLScojZa4zQmlAO5365EYp8gGcd7npMtk9YyxVh7MG1jrUp7mNQ/viewform
"Windows Kernel Debugging, Internals, and Exploitation" Pre-Class Survey - Beta

MalwareBazaar | 193-149-176-134

https://bazaar.abuse.ch/browse/tag/193-149-176-134/
MalwareBazaar | 193-149-176-134

Meta’s Adversarial Threat Report, Second Quarter 2022 | Meta

https://about.fb.com/news/2022/08/metas-adversarial-threat-report-q2-2022/
Meta’s Adversarial Threat Report, Second Quarter 2022 | Meta

Cisco Business Routers Found Vulnerable to Critical Remote Hacking Flaws

https://thehackernews.com/2022/08/cisco-business-routers-found-vulnerable.html
Cisco Business Routers Found Vulnerable to Critical Remote Hacking Flaws

Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for Espionage

https://thehackernews.com/2022/08/hackers-exploited-atlassian-confluence.html
Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for Espionage