Hacker Trends
02/20
02/21
02/22
Statistic
11/07 04:45 (UTC)
02/20
02/21
02/22
17 Posts
GitHub - watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
https://
github.com
/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
7 Posts
Cyber-related Designations | Office of Foreign Assets Control
https://
ofac.treasury.gov
/recent-actions/20240220
6 Posts
snovvcrash/ollvm13 - Docker Image | Docker Hub
https://
hub.docker.com
/r/snovvcrash/ollvm13
5 Posts
US offers $15 million bounty for info on LockBit ransomware gang
https://
www.bleepingcomputer.com
/news/security/us-offers-15-million-bounty-for-info-on-lockbit-ransomware-gang/
5 Posts
Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks
https://
thehackernews.com
/2024/02/russian-hackers-target-ukraine-with.html
5 Posts
ConnectWise ScreenConnect: Authentication Bypass Deep Dive – Horizon3.ai
https://
www.horizon3.ai
/attack-research/red-team/connectwise-screenconnect-auth-bypass-deep-dive/
5 Posts
llvm-project-deluge/Manifesto.md at deluge · pizlonator/llvm-project-deluge · GitHub
https://
github.com
/pizlonator/llvm-project-deluge/blob/deluge/Manifesto.md
4 Posts
A first analysis of the i-Soon data leak | Malwarebytes
https://
www.malwarebytes.com
/blog/news/2024/02/a-first-analysis-of-the-i-soon-data-leak
4 Posts
New SSH-Snake malware steals SSH keys to spread across the network
https://
www.bleepingcomputer.com
/news/security/new-ssh-snake-malware-steals-ssh-keys-to-spread-across-the-network/
4 Posts
Apple Adds Post-Quantum Encryption to iMessage - SecurityWeek
https://
www.securityweek.com
/apple-adds-post-quantum-encryption-to-imessage/
4 Posts
Signal Introduces Usernames, Allowing Users to Keep Their Phone Numbers Private
https://
thehackernews.com
/2024/02/signal-introduces-usernames-allowing.html
4 Posts
Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS
https://
thehackernews.com
/2024/02/mustang-panda-targets-asia-with.html
4 Posts
Microsoft rolls out expanded logging six months after Chinese breach | CyberScoop
https://
cyberscoop.com
/microsoft-logging-cisa-omb/
4 Posts
Top 10 web hacking techniques of 2023 | PortSwigger Research
https://
portswigger.net
/research/top-10-web-hacking-techniques-of-2023
4 Posts
VMware Alert: Uninstall EAP Now - Critical Flaw Puts Active Directory at Risk
https://
thehackernews.com
/2024/02/vmware-alert-uninstall-eap-now-critical.html
3 Posts
Detection Rules Development Framework – Purple Team
https://
ipurple.team
/2024/02/21/detection-rules-development-framework/
3 Posts
ランサムウェアによる暗号化被害データに関する復号ツールの開発について|警察庁Webサイト
https://
www.npa.go.jp
/news/release/2024/20240214002.html
3 Posts
Marco Ivaldi: "Sensecon 23: from #Windows dri…" - Infosec Exchange
https://
infosec.exchange
/@raptor/111967866681269848
3 Posts
New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers
https://
thehackernews.com
/2024/02/new-wi-fi-vulnerabilities-expose.html
3 Posts
BREAKDEV - Offensive Security Tools & Research
https://
breakdev.org
/
3 Posts
APT_REPORT/summary/2024/2024-unit42-incident-response-report_compressed.pdf at master · blackorbird/APT_REPORT · GitHub
https://
github.com
/blackorbird/APT_REPORT/blob/master/summary/2024/2024-unit42-incident-response-report_compressed.pdf
3 Posts
Cross-Site Scripting (XSS) Explained! // How to Bug Bounty - YouTube
https://
youtu.be
/ej2O4lOUzRc
3 Posts
Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war
https://
www.welivesecurity.com
/en/eset-research/operation-texonto-information-operation-targeting-ukrainian-speakers-context-war/
3 Posts
SensePost | Sensecon 23: from windows drivers to an almost fully working edr
https://
sensepost.com
/blog/2024/sensecon-23-from-windows-drivers-to-an-almost-fully-working-edr/
3 Posts
Bypassing a noexec by elf roping - The Cave
https://
blog.xilokar.info
/bypassing-a-noexec-by-elf-roping.html
3 Posts
Control Systems Firm PSI Struggles to Recover From Ransomware Attack - SecurityWeek
https://
www.securityweek.com
/control-systems-firm-psi-struggles-to-recover-from-ransomware-attack/
3 Posts
Teeth/planck-mini.bin at main · lozaning/Teeth · GitHub
https://
github.com
/lozaning/Teeth/blob/main/planck-mini.bin
3 Posts
Executive Order on Port Cybersecurity Points to IT/OT Threat Posed by Chinese Cranes - SecurityWeek
https://
www.securityweek.com
/executive-order-on-port-cybersecurity-points-to-it-ot-threat-posed-by-chinese-cranes/
3 Posts
AWS Ransomware | dfir.ch
https://
dfir.ch
/posts/aws_ransomware/
3 Posts
All About Hackbots: AI Agents That Hack · Joseph Thacker
https://
josephthacker.com
/ai/2024/02/21/hackbots.html
3 Posts
SANS Digital Forensics and Incident Response - YouTube
https://
www.youtube.com
/@SANSForensics/videos?view=0&sort=dd&shelf_id=0
3 Posts
Chrome 122, Firefox 123 Patch High-Severity Vulnerabilities - SecurityWeek
https://
www.securityweek.com
/chrome-122-firefox-123-patch-high-severity-vulnerabilities/
3 Posts
Playing with Libmalloc in 2024
https://
blackwinghq.com
/blog/posts/playing-with-libmalloc/