Groups
Sign in
Groups
Technical - Malware
Conversations
About
Send feedback
Help
Technical - Malware
Contact owners and managers
1–30 of 7930
Mark all as read
Report group
0 selected
Eyal Estrin
2
1:01 AM
Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities
https://www.cisa.gov/news-events/news/cyber-hygiene-helps-organizations-mitigate-ransomware-related-
unread,
Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities
https://www.cisa.gov/news-events/news/cyber-hygiene-helps-organizations-mitigate-ransomware-related-
1:01 AM
Eyal Estrin
1:01 AM
Phishing Campaigns Targeting USPS See as Much Web Traffic as the USPS Itself
https://www.akamai.com/blog/security-research/phishing-usps-malicious-domains-traffic-equal-to-
unread,
Phishing Campaigns Targeting USPS See as Much Web Traffic as the USPS Itself
https://www.akamai.com/blog/security-research/phishing-usps-malicious-domains-traffic-equal-to-
1:01 AM
Eyal Estrin
Apr 28
Hackers are using developing countries for ransomware practice
https://arstechnica.com/security/2024/04/hackers-are-carrying-out-ransomware-experiments-in-
unread,
Hackers are using developing countries for ransomware practice
https://arstechnica.com/security/2024/04/hackers-are-carrying-out-ransomware-experiments-in-
Apr 28
Eyal Estrin
Apr 27
New Malware Campaign Targets WP-Automatic Plugin
https://wpscan.com/blog/new-malware-campaign-targets-wp-automatic-plugin/ Eyal Estrin CISSP, CCSP,
unread,
New Malware Campaign Targets WP-Automatic Plugin
https://wpscan.com/blog/new-malware-campaign-targets-wp-automatic-plugin/ Eyal Estrin CISSP, CCSP,
Apr 27
Eyal Estrin
Apr 26
The spam came from inside the house: How a smart TV can choke a Windows PC
https://arstechnica.com/gadgets/2024/04/the-spam-came-from-inside-the-house-how-a-smart-tv-can-choke-
unread,
The spam came from inside the house: How a smart TV can choke a Windows PC
https://arstechnica.com/gadgets/2024/04/the-spam-came-from-inside-the-house-how-a-smart-tv-can-choke-
Apr 26
Eyal Estrin
Apr 26
Autodesk hosting PDF files used in Microsoft phishing attacks
https://www.netcraft.com/blog/autodesk-hosting-pdf-files-used-in-microsoft-phishing-attacks/ Eyal
unread,
Autodesk hosting PDF files used in Microsoft phishing attacks
https://www.netcraft.com/blog/autodesk-hosting-pdf-files-used-in-microsoft-phishing-attacks/ Eyal
Apr 26
Eyal Estrin
Apr 26
Researchers sinkhole PlugX malware server with 2.5 million unique IPs
https://www.bleepingcomputer.com/news/security/researchers-sinkhole-plugx-malware-server-with-25-
unread,
Researchers sinkhole PlugX malware server with 2.5 million unique IPs
https://www.bleepingcomputer.com/news/security/researchers-sinkhole-plugx-malware-server-with-25-
Apr 26
Eyal Estrin
Apr 26
Unplugging PlugX: Sinkholing the PlugX USB worm botnet
https://blog.sekoia.io/unplugging-plugx-sinkholing-the-plugx-usb-worm-botnet/ Eyal Estrin CISSP, CCSP
unread,
Unplugging PlugX: Sinkholing the PlugX USB worm botnet
https://blog.sekoia.io/unplugging-plugx-sinkholing-the-plugx-usb-worm-botnet/ Eyal Estrin CISSP, CCSP
Apr 26
Eyal Estrin
Apr 25
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-
unread,
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-
Apr 25
Eyal Estrin
Apr 25
Key takeaways from the 2024 Phishing Threat Trends Report
https://www.egress.com/blog/company-news/takeaways-from-the-phishing-threat-trends-report Eyal Estrin
unread,
Key takeaways from the 2024 Phishing Threat Trends Report
https://www.egress.com/blog/company-news/takeaways-from-the-phishing-threat-trends-report Eyal Estrin
Apr 25
Eyal Estrin
Apr 25
Zscaler ThreatLabz 2024 Phishing Report
https://www.zscaler.com/campaign/threatlabz-phishing-report Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
Zscaler ThreatLabz 2024 Phishing Report
https://www.zscaler.com/campaign/threatlabz-phishing-report Eyal Estrin CISSP, CCSP, CISM, CISA,
Apr 25
Eyal Estrin
Apr 24
GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining
https://decoded.avast.io/janrubin/guptiminer-hijacking-antivirus-updates-for-distributing-backdoors-
unread,
GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining
https://decoded.avast.io/janrubin/guptiminer-hijacking-antivirus-updates-for-distributing-backdoors-
Apr 24
Eyal Estrin
Apr 23
GitHub comments abused to push malware via Microsoft repo URLs
https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-malware-via-microsoft-
unread,
GitHub comments abused to push malware via Microsoft repo URLs
https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-malware-via-microsoft-
Apr 23
Eyal Estrin
Apr 23
RaaS devs hurt their credibility by cheating affiliates in Q1 2024
https://www.coveware.com/blog/2024/4/17/raas-devs-hurt-their-credibility-by-cheating-affiliates-in-q1
unread,
RaaS devs hurt their credibility by cheating affiliates in Q1 2024
https://www.coveware.com/blog/2024/4/17/raas-devs-hurt-their-credibility-by-cheating-affiliates-in-q1
Apr 23
Eyal Estrin
Apr 23
The Dark Side of EDR: Repurpose EDR as an Offensive Tool
https://www.safebreach.com/blog/dark-side-of-edr-offensive-tool/ Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
The Dark Side of EDR: Repurpose EDR as an Offensive Tool
https://www.safebreach.com/blog/dark-side-of-edr-offensive-tool/ Eyal Estrin CISSP, CCSP, CISM, CISA,
Apr 23
Eyal Estrin
Apr 23
Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm
https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm/ Eyal Estrin CISSP
unread,
Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm
https://cloud.google.com/blog/topics/threat-intelligence/apt44-unearthing-sandworm/ Eyal Estrin CISSP
Apr 23
Eyal Estrin
Apr 23
EDR = Erase Data Remotely
https://i.blackhat.com/Asia-24/Presentations/Asia-24_Bar-EDREraseDataRemotelyReloaded.pdf Eyal Estrin
unread,
EDR = Erase Data Remotely
https://i.blackhat.com/Asia-24/Presentations/Asia-24_Bar-EDREraseDataRemotelyReloaded.pdf Eyal Estrin
Apr 23
Eyal Estrin
Apr 23
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials
https://www.microsoft.com/en-us/security/blog/2024/04/22/analyzing-forest-blizzards-custom-post-
unread,
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials
https://www.microsoft.com/en-us/security/blog/2024/04/22/analyzing-forest-blizzards-custom-post-
Apr 23
Eyal Estrin
Apr 20
HelloKitty ransomware rebrands, releases CD Projekt and Cisco data
https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-rebrands-releases-cd-projekt-and
unread,
HelloKitty ransomware rebrands, releases CD Projekt and Cisco data
https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-rebrands-releases-cd-projekt-and
Apr 20
Eyal Estrin
Apr 18
SoumniBot: the new Android banker’s unique techniques
https://securelist.com/soumnibot-android-banker-obfuscates-app-manifest/112334/ Eyal Estrin CISSP,
unread,
SoumniBot: the new Android banker’s unique techniques
https://securelist.com/soumnibot-android-banker-obfuscates-app-manifest/112334/ Eyal Estrin CISSP,
Apr 18
Eyal Estrin
Apr 18
Redline Stealer Malware Evolves with Sneaky New Tricks, Spreads Globally
https://securityonline.info/redline-stealer-malware-evolves-with-sneaky-new-tricks-spreads-globally/
unread,
Redline Stealer Malware Evolves with Sneaky New Tricks, Spreads Globally
https://securityonline.info/redline-stealer-malware-evolves-with-sneaky-new-tricks-spreads-globally/
Apr 18
Eyal Estrin
Apr 18
#StopRansomware: Akira Ransomware
https://www.cisa.gov/sites/default/files/2024-04/aa24-109a-stopransomware-akira-ransomware.pdf Eyal
unread,
#StopRansomware: Akira Ransomware
https://www.cisa.gov/sites/default/files/2024-04/aa24-109a-stopransomware-akira-ransomware.pdf Eyal
Apr 18
Eyal Estrin
Apr 16
LightSpy Returns: Renewed Espionage Campaign Targets Southern Asia, Possibly India
https://blogs.blackberry.com/en/2024/04/lightspy-returns-renewed-espionage-campaign-targets-southern-
unread,
LightSpy Returns: Renewed Espionage Campaign Targets Southern Asia, Possibly India
https://blogs.blackberry.com/en/2024/04/lightspy-returns-renewed-espionage-campaign-targets-southern-
Apr 16
Eyal Estrin
Apr 16
Unpacking the Blackjack Group's Fuxnet Malware
https://claroty.com/team82/research/unpacking-the-blackjack-groups-fuxnet-malware Eyal Estrin CISSP,
unread,
Unpacking the Blackjack Group's Fuxnet Malware
https://claroty.com/team82/research/unpacking-the-blackjack-groups-fuxnet-malware Eyal Estrin CISSP,
Apr 16
Eyal Estrin
Apr 16
Using the LockBit builder to generate targeted ransomware
https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/ Eyal Estrin CISSP, CCSP,
unread,
Using the LockBit builder to generate targeted ransomware
https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/ Eyal Estrin CISSP, CCSP,
Apr 16
Eyal Estrin
Apr 15
Crooks manipulate GitHub's search results to distribute malware
https://securityaffairs.com/161792/cyber-crime/githubs-search-results-distribute-malware.html Eyal
unread,
Crooks manipulate GitHub's search results to distribute malware
https://securityaffairs.com/161792/cyber-crime/githubs-search-results-distribute-malware.html Eyal
Apr 15
Eyal Estrin
Apr 13
iPhone Users in 92 Countries Targeted by Mercenary Spyware Attacks
https://www.hackread.com/iphone-users-mercenary-spyware-attacks/ https://www.hackread.com/quadream-
unread,
iPhone Users in 92 Countries Targeted by Mercenary Spyware Attacks
https://www.hackread.com/iphone-users-mercenary-spyware-attacks/ https://www.hackread.com/quadream-
Apr 13
Eyal Estrin
Apr 12
CISA Releases Malware Next-Gen Analysis System for Public Use
https://www.securityweek.com/cisa-releases-malware-next-gen-analysis-system-for-public-use/ Eyal
unread,
CISA Releases Malware Next-Gen Analysis System for Public Use
https://www.securityweek.com/cisa-releases-malware-next-gen-analysis-system-for-public-use/ Eyal
Apr 12
Eyal Estrin
Apr 12
It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise
https://unit42.paloaltonetworks.com/malware-initiated-scanning-attacks/ Eyal Estrin CISSP, CCSP, CISM
unread,
It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise
https://unit42.paloaltonetworks.com/malware-initiated-scanning-attacks/ Eyal Estrin CISSP, CCSP, CISM
Apr 12
Eyal Estrin
Apr 10
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
https://blog.sekoia.io/tycoon-2fa-an-in-depth-analysis-of-the-latest-version-of-the-aitm-phishing-kit
unread,
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
https://blog.sekoia.io/tycoon-2fa-an-in-depth-analysis-of-the-latest-version-of-the-aitm-phishing-kit
Apr 10