08/01

Ivanti EPMM (MobileIron Core) Authentication Bypass Attempt | GreyNoise Visualizer

https://viz.greynoise.io/tag/ivanti-epmm-mobileiron-core-authentication-bypass-attempt?days=10
Ivanti EPMM (MobileIron Core) Authentication Bypass Attempt | GreyNoise Visualizer

Researchers Expose Space Pirates' Cyber Campaign Across Russia and Serbia

https://thehackernews.com/2023/08/researchers-expose-space-pirate-cyber.html
Researchers Expose Space Pirates' Cyber Campaign Across Russia and Serbia

Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking Trojan

https://thehackernews.com/2023/08/cybercriminals-renting-wikiloader-to.html
Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking Trojan

European Bank Customers Targeted in SpyNote Android Trojan Campaign

https://thehackernews.com/2023/08/european-bank-customers-targeted-in.html
European Bank Customers Targeted in SpyNote Android Trojan Campaign

Out of the Sandbox: WikiLoader Digs Sophisticated Evasion   | Proofpoint US

https://www.proofpoint.com/us/blog/threat-insight/out-sandbox-wikiloader-digs-sophisticated-evasion
Out of the Sandbox: WikiLoader Digs Sophisticated Evasion   | Proofpoint US

China's APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe

https://thehackernews.com/2023/08/chinas-apt31-suspected-in-attacks-on.html
China's APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe

New NodeStealer Targeting Facebook Business Accounts and Crypto Wallets

https://thehackernews.com/2023/08/new-nodestealer-targeting-facebook.html
New NodeStealer Targeting Facebook Business Accounts and Crypto Wallets

Manipulated Caiman: The Sophisticated Snare of Mexico's Banking Predators - Perception Point

https://perception-point.io/blog/manipulated-caiman-the-sophisticated-snare-of-mexicos-banking-predators-technical-edition/
Manipulated Caiman: The Sophisticated Snare of Mexico's Banking Predators - Perception Point

ZAP – ZAP is Joining the Software Security Project

https://www.zaproxy.org/blog/2023-08-01-zap-is-joining-the-software-security-project/
ZAP – ZAP is Joining the Software Security Project

Cloud company assisted 17 different government hacking groups -US researchers | Reuters

https://www.reuters.com/technology/cloud-company-assisted-17-different-government-hacking-groups-us-researchers-2023-08-01/
Cloud company assisted 17 different government hacking groups -US researchers | Reuters

APT_REPORT/konni/20230727_threat_inteligence_report_Konni.pdf at master · blackorbird/APT_REPORT · GitHub

https://github.com/blackorbird/APT_REPORT/blob/master/konni/20230727_threat_inteligence_report_Konni.pdf
APT_REPORT/konni/20230727_threat_inteligence_report_Konni.pdf at master · blackorbird/APT_REPORT · GitHub

Copy of CSM Login Okta - Customer Support

https://beyondtrustcorp.service-now.com/csm?id=kb_article_view&sysparm_article=KB0020207
Copy of CSM Login Okta - Customer Support

200 Canon Printer Models May Expose Wi-Fi Connection Data - SecurityWeek

https://www.securityweek.com/200-canon-printer-models-may-expose-wi-fi-connection-data/
200 Canon Printer Models May Expose Wi-Fi Connection Data - SecurityWeek

CVE-2023-3519 | AttackerKB

https://attackerkb.com/topics/si09VNJhHh/cve-2023-3519/rapid7-analysis
CVE-2023-3519 | AttackerKB

Retail chain Hot Topic discloses wave of credential-stuffing attacks

https://www.bleepingcomputer.com/news/security/retail-chain-hot-topic-discloses-wave-of-credential-stuffing-attacks/
Retail chain Hot Topic discloses wave of credential-stuffing attacks

The Most Useful Recon Trick - YouTube

https://youtu.be/zDB-SdT6_FI
The Most Useful Recon Trick - YouTube

GitHub - waf-bypass-maker/waf-community-bypasses

https://github.com/waf-bypass-maker/waf-community-bypasses
GitHub - waf-bypass-maker/waf-community-bypasses

http://archwisp.com/mixes/Archwisp%20-%20DEF%20CON%2028%20Defcon%20Parties%20Mix.mp3

http://archwisp.com/mixes/Archwisp%20-%20DEF%20CON%2028%20Defcon%20Parties%20Mix.mp3

Sign in

https://hackerone.com/last-month
Sign in

VirusTotal - File - 904d3fa49f2a9c201153f1c533afd6255fbb21c5ef34331bd8be959f8c6d99fe

https://www.virustotal.com/gui/file/904d3fa49f2a9c201153f1c533afd6255fbb21c5ef34331bd8be959f8c6d99fe/
VirusTotal - File - 904d3fa49f2a9c201153f1c533afd6255fbb21c5ef34331bd8be959f8c6d99fe

The gap in users' identity security knowledge gives cybercriminals an opening - Help Net Security

https://www.helpnetsecurity.com/2023/08/01/identity-security-knowledge/
The gap in users' identity security knowledge gives cybercriminals an opening - Help Net Security

Virtual Influence: A New Take on an Old Saying · rez0

https://rez0.blog/personal/2023/07/30/virtual-influence.html
Virtual Influence: A New Take on an Old Saying · rez0

Ghidra

http://ghidra-sre.org
Ghidra

Hackers use new malware to breach air-gapped devices in Eastern Europe

https://www.bleepingcomputer.com/news/security/hackers-use-new-malware-to-breach-air-gapped-devices-in-eastern-europe/
Hackers use new malware to breach air-gapped devices in Eastern Europe