09/08

Attacking Firecracker: AWS' microVM Monitor Written in Rust - Blog | Grapl

http://www.graplsecurity.com/post/attacking-firecracker
Attacking Firecracker: AWS' microVM Monitor Written in Rust - Blog | Grapl

Microsoft investigates Iranian attacks against the Albanian government - Microsoft Security Blog

https://www.microsoft.com/security/blog/2022/09/08/microsoft-investigates-iranian-attacks-against-the-albanian-government/
Microsoft investigates Iranian attacks against the Albanian government - Microsoft Security Blog

2313 - .NET: External Entity Injection during XML signature verification - project-zero

https://bugs.chromium.org/p/project-zero/issues/detail?id=2313
2313 - .NET: External Entity Injection during XML signature verification - project-zero

APT42: Crooked Charms, Cons, and Compromises | Mandiant

https://www.mandiant.com/resources/blog/apt42-charms-cons-compromises
APT42: Crooked Charms, Cons, and Compromises | Mandiant

Profiling DEV-0270: PHOSPHORUS’ ransomware operations - Microsoft Security Blog

https://www.microsoft.com/security/blog/2022/09/07/profiling-dev-0270-phosphorus-ransomware-operations/
Profiling DEV-0270: PHOSPHORUS’ ransomware operations - Microsoft Security Blog

Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages

https://www.bleepingcomputer.com/news/security/ransomware-gangs-cobalt-strike-servers-ddosed-with-anti-russia-messages/
Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages

GIFShell attack creates reverse shell using Microsoft Teams GIFs

https://www.bleepingcomputer.com/news/security/gifshell-attack-creates-reverse-shell-using-microsoft-teams-gifs/
GIFShell attack creates reverse shell using Microsoft Teams GIFs

Initial access broker repurposing techniques in targeted attacks against Ukraine

https://blog.google/threat-analysis-group/initial-access-broker-repurposing-techniques-in-targeted-attacks-against-ukraine/
Initial access broker repurposing techniques in targeted attacks against Ukraine

On Detection: Tactical to Function | by Jared Atkinson | Sep, 2022 | Posts By SpecterOps Team Members

https://posts.specterops.io/on-detection-tactical-to-function-810c14798f63
On Detection: Tactical to Function | by Jared Atkinson | Sep, 2022 | Posts By SpecterOps Team Members

Microsoft Warns of Ransomware Attacks by Iranian Phosphorus Hacker Group

https://thehackernews.com/2022/09/microsoft-warns-of-ransomware-attacks.html
Microsoft Warns of Ransomware Attacks by Iranian Phosphorus Hacker Group

The Curious Case of ā€œMontiā€ Ransomware: A Real-World Doppelganger

https://blogs.blackberry.com/en/2022/09/the-curious-case-of-monti-ransomware-a-real-world-doppelganger
The Curious Case of ā€œMontiā€ Ransomware: A Real-World Doppelganger

HADNAGY v. MOSS, 2:22-cv-03060 – CourtListener.com

https://www.courtlistener.com/docket/64866230/hadnagy-v-moss/
HADNAGY v. MOSS, 2:22-cv-03060 – CourtListener.com

Cisco Releases Security Patches for New Vulnerabilities Impacting Multiple Products

https://thehackernews.com/2022/09/cisco-releases-security-patches-for-new.html
Cisco Releases Security Patches for New Vulnerabilities Impacting Multiple Products

North Korean Lazarus Hackers Targeting Energy Providers Around the World

https://thehackernews.com/2022/09/north-korean-lazarus-hackers-targeting.html
North Korean Lazarus Hackers Targeting Energy Providers Around the World

Cybersecurity Alert Priority Matrix | by Josh Lemon | Medium

https://blog.joshlemon.com.au/cybersecurity-alert-priority-matrix-92a20fe8d955
Cybersecurity Alert Priority Matrix | by Josh Lemon | Medium

SOC Core Skills w/ John Strand - Antisyphon

https://www.antisyphontraining.com/soc-core-skills-w-john-strand/
SOC Core Skills w/ John Strand - Antisyphon

Albanian cyber war - by the grugq - The Info Op

https://grugq.substack.com/p/albanian-cyber-war
Albanian cyber war - by the grugq - The Info Op