Hacker Trends
05/24
05/25
05/26
Statistic
05/18 20:42 (UTC)
05/24
05/25
05/26
11 tweets
People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection | CISA
https://
www.cisa.gov
/news-events/cybersecurity-advisories/aa23-144a
6 tweets
CVE-2022-3723: Logic Issue in Turbofan JIT Compiler | 0-days In-the-Wild
https://
googleprojectzero.github.io
/0days-in-the-wild//0day-RCAs/2022/CVE-2022-3723.html
6 tweets
ESET Research on Twitter: "#ESETResearch warns about a CPIO archive named “Jump Crypto Investment https://t.co/Er3H0htWQ2” uploaded to VirusTotal from the USA 🇺🇸. It is another malicious PDF viewer distributed by #Lazarus #APT for #macOS https://t.co/hGGJS9PI8G @pkalnai @michalmalik 1/7 https://t.co/Zb9F4lpS7u" / Twitter
https://
twitter.com
/ESETresearch/status/1656385173968019456
5 tweets
https://
www.bleepingcomputer.com
/news/security/hackers-target-15m-wordpress-sites-with-cookie-consent-plugin-exploit/
5 tweets
Operation "Total Exchange": New PowerExchange Backdoor Discovered in the UAE | FortiGuard Labs
https://
www.fortinet.com
/blog/threat-research/operation-total-exchange-backdoor-discovered
5 tweets
Infecting SSH Public Keys with backdoors
https://
blog.thc.org
/infecting-ssh-public-keys-with-backdoors
5 tweets
GitLab 'strongly recommends' patching max severity flaw ASAP
https://
www.bleepingcomputer.com
/news/security/gitlab-strongly-recommends-patching-max-severity-flaw-asap/
5 tweets
Free VPN Service SuperVPN Exposes 360 Million User Records
https://
www.hackread.com
/free-vpn-service-supervpn-leaks-user-records/
5 tweets
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises | Mandiant
https://
www.mandiant.com
/resources/blog/cosmicenergy-ot-malware-russian-response
4 tweets
BSidesCharm 2023 - AD and DNS: A Match Made in Heck - Jim Sykora and Jake Hildreth - YouTube
https://
youtu.be
/QSRxrTXj8G0
4 tweets
https://
www.bleepingcomputer.com
/news/technology/chatgpt-is-down-worldwide-openai-confirms-issues/
4 tweets
The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile | Akamai
https://
www.akamai.com
/blog/security-research/dark-frost-botnet-unexpected-author-profile
4 tweets
China's Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected
https://
thehackernews.com
/2023/05/chinas-stealthy-hackers-infiltrate-us.html
4 tweets
Special Offer for Asia Pacific Students | SANS Online Training
https://
www.sans.org
/u/1qM7
4 tweets
Special Offer for Asia Pacific Students | SANS Online Training
https://
www.sans.org
/u/1qGD
4 tweets
SANSFIRE Washington, DC 2023 | Cyber Security Training
https://
www.sans.org
/u/1opv
4 tweets
Barracuda Email Security Gateway (ESG) hacked via zero-day bugSecurity Affairs
https://
securityaffairs.com
/146620/hacking/barracuda-email-security-gateway-bug.html
4 tweets
Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware
https://
blog.talosintelligence.com
/mercenary-intellexa-predator/
4 tweets
GitHub - RoseSecurity/Anti-Virus-Evading-Payloads: During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you will need to be able to bypass antivirus software or other host-based protection for successful exploitation. The most effective way to avoid antivirus detection on your target's computers is to create your own customized backdoor. Here is a simple way to evade anti-virus software when creating backdoors!
https://
github.com
/RoseSecurity/Anti-Virus-Evading-Payloads
4 tweets
Rooting with root cause: finding a variant of a Project Zero bug | The GitHub Blog
https://
github.blog
/2023-05-25-rooting-with-root-cause-finding-a-variant-of-a-project-zero-bug/
4 tweets
New Buhti ransomware gang uses leaked Windows, Linux encryptors
https://
www.bleepingcomputer.com
/news/security/new-buhti-ransomware-gang-uses-leaked-windows-linux-encryptors/
4 tweets
Buhti: New Ransomware Operation Relies on Repurposed Payloads | Symantec Enterprise Blogs
https://
symantec-enterprise-blogs.security.com
/blogs/threat-intelligence/buhti-ransomware
3 tweets
ATTL4S
https://
attl4s.github.io
/
3 tweets
Malware/Qilin at main · rivitna/Malware · GitHub
https://
github.com
/rivitna/Malware/tree/main/Qilin
3 tweets
‘Operation Magalenha’ targets credentials of 30 Portuguese banks
https://
www.bleepingcomputer.com
/news/security/operation-magalenha-targets-credentials-of-30-portuguese-banks/
3 tweets
Ransomchats Viewer
https://
ransomch.at
/
3 tweets
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog
https://
www.microsoft.com
/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
3 tweets
Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations | Secureworks
https://
www.secureworks.com
/blog/chinese-cyberespionage-group-bronze-silhouette-targets-us-government-and-defense-organizations
3 tweets
Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code
https://
thehackernews.com
/2023/05/buhti-ransomware-gang-switches-tactics.html
3 tweets
Neutralize threats before Impact
http://
Sekoia.io
3 tweets
Exclusive: Russian hypersonic scientist accused of betraying secrets to China | Reuters
https://
www.reuters.com
/world/russian-hypersonic-scientist-accused-betraying-secrets-china-sources-2023-05-24/
3 tweets
Daily Cyber Briefing - Thursday 25th May / Twitter
https://
twitter.com
/i/broadcasts/1vOxwMagbVbGB
3 tweets
https://
www.bleepingcomputer.com
/news/security/chinese-hackers-breach-us-critical-infrastructure-in-stealthy-attacks/
3 tweets
Four Key GDPR Trends on the Law’s Fifth Anniversary - Infosecurity Magazine
https://
www.infosecurity-magazine.com
/news-features/gdpr-trends-fifth-anniversary/
3 tweets
RFC: Enforcing Bounds Safety in C (-fbounds-safety) - Clang Frontend - LLVM Discussion Forums
https://
discourse.llvm.org
/t/rfc-enforcing-bounds-safety-in-c-fbounds-safety/70854
3 tweets
How to start reviewing code?. Too often (me included), savvy code… | by PentesterLab | PentesterLab
https://
blog.pentesterlab.com
/how-to-start-reviewing-code-bc39df869140
3 tweets
the tiny corp raised $5.1M | the singularity is nearer
https://
geohot.github.io
/blog/jekyll/update/2023/05/24/the-tiny-corp-raised-5M.html
3 tweets
New PowerExchange malware backdoors Microsoft Exchange servers
https://
www.bleepingcomputer.com
/news/security/new-powerexchange-malware-backdoors-microsoft-exchange-servers/