Hacker Trends
08/07
08/08
08/09
Statistic
01/20 14:53 (UTC)
08/07
08/08
08/09
9 Posts
r-tec Blog | Evade signature-based phishing detections - r-tec Cyber Security
https://
www.r-tec.net
/r-tec-blog-evade-signature-based-phishing-detections.html
8 Posts
Webinar Registration - Zoom
https://
ghst.ly
/3Om0jDo
8 Posts
BloodHound Community Edition: A New Era | by Andy Robbins | Aug, 2023 | Posts By SpecterOps Team Members
https://
posts.specterops.io
/bloodhound-community-edition-a-new-era-d64689806e90
5 Posts
https://github.com/SpecterOps/BloodHound/raw/main/examples/docker-compose/docker-compose.yml
https://
github.com
/SpecterOps/BloodHound/raw/main/examples/docker-compose/docker-compose.yml
5 Posts
https://
app.any.run
/tasks/74fdd4a4-643c-4b62-804b-b62582bcc3da
5 Posts
China hacked Japan’s classified defense cyber networks, officials say - The Washington Post
https://
www.washingtonpost.com
/national-security/2023/08/07/china-japan-hack-pentagon/
5 Posts
LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes
https://
thehackernews.com
/2023/08/lolbas-in-wild-11-living-off-land.html
5 Posts
QakBot Malware Operators Expand C2 Network with 15 New Servers
https://
thehackernews.com
/2023/08/qakbot-malware-operators-expand-c2.html
4 Posts
Ozzie Osband, Originator of "3-2-1" Telephone Area Code and "Rocket Hobo," Passes Away at 72
https://
talkoftitusville.com
/2023/08/06/ozzie-osband-originator-of-3-2-1-telephone-area-code-and-rocket-hobo-passes-away-at-72/
4 Posts
Black Hat Preview: The Business of Cyber Takes Center Stage - SecurityWeek
https://
www.securityweek.com
/black-hat-preview-the-business-of-cyber-takes-center-stage/
4 Posts
Special Offer for Asia Pacific Students | SANS Online Training
https://
www.sans.org
/u/1rOI
4 Posts
Microsoft August 2023 Patch Tuesday warns of 2 zero-days, 87 flaws
https://
www.bleepingcomputer.com
/news/microsoft/microsoft-august-2023-patch-tuesday-warns-of-2-zero-days-87-flaws/
4 Posts
How we made $5000 with this exploit - YouTube
https://
www.youtube.com
/watch?v=Wgo3bGv6KqI
4 Posts
GitHub - alexandreborges/malwoverview: Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
https://
github.com
/alexandreborges/malwoverview
4 Posts
New Yashma Ransomware Variant Targets Multiple English-Speaking Countries
https://
thehackernews.com
/2023/08/new-yashma-ransomware-variant-targets.html
4 Posts
Intel BIOS Advisory – Memory Corruption in HID Drivers | NCC Group Research Blog | Making the world safer and more secure
https://
research.nccgroup.com
/2023/08/08/intel-bios-advisory-memory-corruption-in-hid-drivers/
4 Posts
DEF CON 31 Living Next Door to Russia
https://
info.defcon.org
/event/?id=50859
4 Posts
Understanding Active Directory Attack Paths to Improve Security
https://
thehackernews.com
/2023/08/understanding-active-directory-attack.html
4 Posts
Cookieless DuoDrop: IIS Auth Bypass & App Pool Privesc in ASP.NET Framework (CVE-2023-36899) | Soroush Dalili (@irsdl) Blog
https://
soroush.me
/blog/2023/08/cookieless-duodrop-iis-auth-bypass-app-pool-privesc-in-asp-net-framework-cve-2023-36899/
4 Posts
iOS 17: New Version, New Acronyms — Dataflow Forensics
https://
www.df-f.com
/blog/ios17
4 Posts
Android 14 to let you block connections to unencrypted cellular networks
https://
www.bleepingcomputer.com
/news/google/android-14-to-block-connections-to-unencrypted-cellular-networks/
4 Posts
Interpol takes down 16shop phishing-as-a-service platform
https://
www.bleepingcomputer.com
/news/security/interpol-takes-down-16shop-phishing-as-a-service-platform/
4 Posts
Hackers increasingly abuse Cloudflare Tunnels for stealthy connections
https://
www.bleepingcomputer.com
/news/security/hackers-increasingly-abuse-cloudflare-tunnels-for-stealthy-connections/
4 Posts
New Downfall attacks on Intel CPUs steal encryption keys, data
https://
www.bleepingcomputer.com
/news/security/new-downfall-attacks-on-intel-cpus-steal-encryption-keys-data/
3 Posts
Notorious phishing platform shut down, arrests in international police operation
https://
www.interpol.int
/News-and-Events/News/2023/Notorious-phishing-platform-shut-down-arrests-in-international-police-operation
3 Posts
https://redsiege.com/jargon
https://
redsiege.com
/jargon
3 Posts
Authorities Warn Health Sector of Attacks by Rhysida Group
https://
www.healthcareinfosecurity.com
/authorities-warn-health-sector-attacks-by-rhysida-group-a-22753
3 Posts
20230808_press.pdf
https://
www.npa.go.jp
/bureau/cyber/pdf/20230808_press.pdf
3 Posts
Google Online Security Blog: Downfall and Zenbleed: Googlers helping secure the ecosystem
https://
security.googleblog.com
/2023/08/downfall-and-zenbleed-googlers-helping.html
3 Posts
New Inception attack leaks sensitive data from all AMD Zen CPUs
https://
www.bleepingcomputer.com
/news/security/new-inception-attack-leaks-secrets-from-all-amd-zen-cpus/
3 Posts
CVE-2023-39526: Critical SQL injection in PrestaShop
https://
securityonline.info
/cve-2023-39526-critical-sql-injection-in-prestashop/
3 Posts
eSentire | eSentire Threat Intelligence Malware Analysis: Raccoon…
https://
www.esentire.com
/blog/esentire-threat-intelligence-malware-analysis-raccoon-stealer-v2-part-2
3 Posts
UK Electoral Commission data breach exposes 8 years of voter data
https://
www.bleepingcomputer.com
/news/security/uk-electoral-commission-data-breach-exposes-8-years-of-voter-data/
3 Posts
DNS Takeover Explained: Protect Your Online Domain | Trickest
https://
trickest.com
/blog/dns-takeover-explained-protect-your-online-domain/
3 Posts
https://
app.any.run
/tasks/aa6816f2-5033-4eb8-a549-85bf8ce750ea/
3 Posts
technical-report.pdf
https://
ssu.gov.ua
/uploads/files/DKIB/technical-report.pdf
3 Posts
Honeypot Recon: New Variant of SkidMap Targeting Redis | Trustwave
https://
www.trustwave.com
/en-us/resources/blogs/spiderlabs-blog/honeypot-recon-new-variant-of-skidmap-targeting-redis/
3 Posts
TikTok facing fines for violating children’s privacy
https://
www.malwarebytes.com
/blog/news/2023/08/tiktok-facing-fines-for-violating-childrens-privacy
3 Posts
CVE-2023-34034 Spring WebFlux Security Bypass Write-up & PoC
https://
jfrog.com
/blog/spring-webflux-cve-2023-34034-write-up-and-proof-of-concept/
3 Posts
https://
www.wired.com
/story/downfall-flaw-intel-chips/
3 Posts
RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale | Recorded Future
https://
www.recordedfuture.com
/redhotel-a-prolific-chinese-state-sponsored-group-operating-at-a-global-scale
3 Posts
Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns - SecurityWeek
https://
www.securityweek.com
/patch-tuesday-adobe-patches-30-acrobat-reader-vulns/
3 Posts
Microsoft Office update breaks actively exploited RCE attack chain
https://
www.bleepingcomputer.com
/news/security/microsoft-office-update-breaks-actively-exploited-rce-attack-chain/
3 Posts
Analysis gtr.exe (MD5: 4449DB01A06234E6223E932114EE390A) Malicious activity - Interactive analysis ANY.RUN
https://
app.any.run
/tasks/20bcc67d-86ca-4a18-8489-a630aeb25151/
3 Posts
Google Online Security Blog: Android 14 introduces first-of-its-kind cellular connectivity security features
https://
security.googleblog.com
/2023/08/android-14-introduces-first-of-its-kind.html
3 Posts
Hackers Abusing Cloudflare Tunnels for Covert Communications
https://
thehackernews.com
/2023/08/hackers-abusing-cloudflare-tunnels-for.html
3 Posts
https://
reconshell.com
/how-to-dump-lsass-without-mimikatz/
3 Posts
2022's most routinely exploited vulnerabilities—history repeats
https://
www.malwarebytes.com
/blog/news/2023/08/the-2022-top-routinely-exploited-vulnerabilities-history-repeats