08/25

Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus

https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus

Notice of Recent Security Incident - The LastPass Blog

https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/
Notice of Recent Security Incident - The LastPass Blog

2290 - Xalan-J: integer truncation in XSLTC - project-zero

https://bugs.chromium.org/p/project-zero/issues/detail?id=2290
2290 - Xalan-J: integer truncation in XSLTC - project-zero

Ghidrathon: Snaking Ghidra with Python 3 Scripting | Mandiant

https://www.mandiant.com/resources/blog/ghidrathon-snaking-ghidra-python-3-scripting
Ghidrathon: Snaking Ghidra with Python 3 Scripting | Mandiant

Websites Can Identify If You’re Using iPhone’s New ‘Lockdown’ Mode

https://www.vice.com/en/article/epzpb4/websites-can-identify-if-youre-using-iphones-new-lockdown-mode
Websites Can Identify If You’re Using iPhone’s New ‘Lockdown’ Mode

Linux Kernel Exploit (CVE-2022-32250) with mqueue | Theori

https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
Linux Kernel Exploit (CVE-2022-32250) with mqueue | Theori

2022_hitcon_settlers_of_netlink.pdf

https://research.nccgroup.com/wp-content/uploads/2022/08/2022_hitcon_settlers_of_netlink.pdf
2022_hitcon_settlers_of_netlink.pdf

Kimsuky’s GoldDragon cluster and its C2 operations | Securelist

https://securelist.com/kimsukys-golddragon-cluster-and-its-c2-operations/107258/
Kimsuky’s GoldDragon cluster and its C2 operations | Securelist

MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone - Microsoft Security Blog

https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone - Microsoft Security Blog

doc-shellcode.rtf (MD5: 5645C167C55B0DA31625C2FD59279829) - Interactive analysis - ANY.RUN

https://app.any.run/tasks/3a8a9a7a-2c6c-4033-a129-612e0f6735c6#
doc-shellcode.rtf (MD5: 5645C167C55B0DA31625C2FD59279829) - Interactive analysis - ANY.RUN

2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications - Binary Golf Grand Prix 3 - IT Security Research by Pierre

https://pierrekim.github.io/blog/2022-08-24-2-byte-dos-freebsd-netbsd-telnetd-netkit-telnetd-inetutils-telnetd-kerberos-telnetd.html
2-byte DoS in freebsd-telnetd / netbsd-telnetd / netkit-telnetd / inetutils-telnetd / telnetd in Kerberos Version 5 Applications - Binary Golf Grand Prix 3 - IT Security Research by Pierre

PyPI Repository Warns Python Project Maintainers About Ongoing Phishing Attacks

https://thehackernews.com/2022/08/pypi-repository-warns-python-project.html
PyPI Repository Warns Python Project Maintainers About Ongoing Phishing Attacks

Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers

https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html
Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers

More hackers adopt Sliver toolkit as a Cobalt Strike alternative

https://www.bleepingcomputer.com/news/security/more-hackers-adopt-sliver-toolkit-as-a-cobalt-strike-alternative/
More hackers adopt Sliver toolkit as a Cobalt Strike alternative