Author: Tekno Phreak
-
BellaCPP, Charming Kitten’s BellaCiao variant written in C++
Iran-linked APT group Charming Kitten has been observed using a new variant of the BellaCiao malware dubbed BellaCPP, Kaspersky researchers…
-
Researchers Uncovered Dark Web Operation Acquiring KYC Details
iProov, a leading provider of biometric identity verification solutions, has uncovered a covert[dark web](https://cybersecuritynews.com/what-is-dark-web-monitoring/)operation aimed at undermining Know Your Customer…
-
Recent Cases of Watering Hole Attacks, Part 2
Continuing from the previous article, Part 2 covers another case of a watering hole attack. This time, we will look…
-
Japan Airlines System Hit by Cyber Attack, Flight Operations Affected
Japan Airlines (JAL), the nation’s second-largest airline, reported a significant cyberattack on its systems early Thursday morning, causing disruptions to…
-
PlugX worm disinfection campaign feedbacks
Reset [Blogpost](https://blog.sekoia.io/category/blogpost/ ‘Blogpost’) [Research -& Threat Intelligence](https://blog.sekoia.io/category/research-threat-intelligence/ ‘Research & Threat Intelligence’) PlugX worm disinfection campaign feedbacks==========================================[Botnet](https://blog.sekoia.io/tag/botnet/) [disinfection](https://blog.sekoia.io/tag/disinfection/) [feedback](https://blog.sekoia.io/tag/feedback/) [plugx](https://blog.sekoia.io/tag/plugx/) ![](https://t7f4e9n3.delivery.rocketcdn.me/wp-content/uploads/2024/04/TDR-badge.png)…
-
IBM AIX Vulnerability Let Attackers Trigger DoS Condition
IBM has reported vulnerabilities in its AIX operating system that could allow attackers to cause a Denial of Service ([DoS](https://cybersecuritynews.com/ios-messenger-dos-vulnerability-emoji/))…
-
Capturing Honeypot Data Beyond the Logs, (Thu, Dec 26th)
[Capturing Honeypot Data Beyond the Logs](/forums/diary/Capturing+Honeypot+Data+Beyond+the+Logs/31546/)=======================================================================================================* * [](http://www.facebook.com/sharer.php?u=https%3A%2F%2Fisc.sans.edu%2Fforums%2Fdiary%2F31546 ‘Share on Facebook’)* [](http://twitter.com/share?text=Capturing%20Honeypot%20Data%20Beyond%20the%20Logs&url=https%3A%2F%2Fisc.sans.edu%2Fforums%2Fdiary%2F31546&via=SANS_ISC ‘Share on Twitter’) **Published** : 2024-12-26. **Last Updated**…
-
Analyzing Malicious Intent in Python Code: A Case Study
Two malicious packages, Zebo-0.1.0 and Cometlogger-0.1, were identified by an AI-driven OSS malware detection system. These packages contain Python scripts…
-
More SSH Fun!
A Windows batch file has been discovered that abuses the ssh.exe tool in modern Windows versions to create a backdoor.…
-
SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 25
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–[Vishing via…