04/19

Evading EDR | No Starch Press

https://nostarch.com/book-edr
Evading EDR | No Starch Press

Microsoft shifts to a new threat actor naming taxonomy - Microsoft Security Blog

https://www.microsoft.com/en-us/security/blog/2023/04/18/microsoft-shifts-to-a-new-threat-actor-naming-taxonomy/
Microsoft shifts to a new threat actor naming taxonomy - Microsoft Security Blog

Process injection in 2023, evading leading EDRs | Vincent Van Mieghem

https://vanmieghem.io/process-injection-evading-edr-in-2023/
Process injection in 2023, evading leading EDRs | Vincent Van Mieghem

Qakbot/Qakbot_obama254_19.04.2023.txt at main · pr0xylife/Qakbot · GitHub

https://github.com/pr0xylife/Qakbot/blob/main/Qakbot_obama254_19.04.2023.txt
Qakbot/Qakbot_obama254_19.04.2023.txt at main · pr0xylife/Qakbot · GitHub

Play ransomware gang uses custom Shadow Volume Copy data-theft tool

https://www.bleepingcomputer.com/news/security/play-ransomware-gang-uses-custom-shadow-volume-copy-data-theft-tool/
Play ransomware gang uses custom Shadow Volume Copy data-theft tool

MalwareBazaar | Browse Checking your browser

https://bazaar.abuse.ch/browse/tag/104-156-149-33/
MalwareBazaar | Browse Checking your browser

Diving into Intel Killer bloatware, part 2 | ZwClose

https://zwclose.github.io/2023/04/18/killer2.html
Diving into Intel Killer bloatware, part 2 | ZwClose

Qakbot/Qakbot_BB24_19.04.2023.txt at main · pr0xylife/Qakbot · GitHub

https://github.com/pr0xylife/Qakbot/blob/main/Qakbot_BB24_19.04.2023.txt
Qakbot/Qakbot_BB24_19.04.2023.txt at main · pr0xylife/Qakbot · GitHub

EnvyScout, Software S0634 | MITRE ATT&CK®

https://attack.mitre.org/software/S0634/
EnvyScout, Software S0634 | MITRE ATT&CK®

US, UK warn of govt hackers using custom malware on Cisco routers

https://www.bleepingcomputer.com/news/security/us-uk-warn-of-govt-hackers-using-custom-malware-on-cisco-routers/
US, UK warn of govt hackers using custom malware on Cisco routers

hack.lu :: pretalx

https://pretalx.com/hack-lu-2023/
hack.lu :: pretalx

Weblogic/Research on WebLogic After-Deserialization.md at main · gobysec/Weblogic · GitHub

https://github.com/gobysec/Weblogic/blob/main/Research%20on%20WebLogic%20After-Deserialization.md
Weblogic/Research on WebLogic After-Deserialization.md at main · gobysec/Weblogic · GitHub

hack.lu 2023

http://2023.hack.lu
hack.lu 2023

How Microsoft names threat actors | Microsoft Learn

https://learn.microsoft.com/zh-cn/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide
How Microsoft names threat actors | Microsoft Learn

Chrome Releases: Stable Channel Update for Desktop

https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
Chrome Releases: Stable Channel Update for Desktop

APT_REPORT/microsoft-threat-actor-list.xlsx at master · blackorbird/APT_REPORT · GitHub

https://github.com/blackorbird/APT_REPORT/blob/master/microsoft-threat-actor-list.xlsx
APT_REPORT/microsoft-threat-actor-list.xlsx at master · blackorbird/APT_REPORT · GitHub

Ransomware gangs abuse Process Explorer driver to kill security software

https://www.bleepingcomputer.com/news/security/ransomware-gangs-abuse-process-explorer-driver-to-kill-security-software/
Ransomware gangs abuse Process Explorer driver to kill security software