Associated Group Descriptions Name TG-3390 Emissary Panda BRONZE UNION APT27 Iron Tiger LuckyMouse CVE-2019-0604 to exploit SharePoint servers to gain initial access to targeted networks. We would like to acknowledge the possibility of an overlap in the AntSword webshell, as we stated that Emissary Panda used China Chopper in the April attacks and AntSword and … Read more Emissary Panda / TG-3390 / BRONZE UNION / APT27 / CVE-2019-0604 to exploit SharePoint servers AntSword & Awen Webshell
SideWinder advanced persistent threat (APT) group, report Trend Micro’s Ecular Xu and Joseph Chen in a blog post. Sidewinder, a group detected by Kaspersky Labs in the first quarter of 2018, primarily targets Pakistani military infrastructure and has been active since at least 2012. Security researchers believe the threat group is associated with Indian espionage … Read more SideWinder APT Group Exploiting CVE-2019-2215 Google Play App Camero, FileCrypt Manager, and callCam
So, if you read my previous post on what hacking was like in the mid 90’s to early 2000’s this post will be basically the polar opposite. The hacking game has drastically changed, the old wild wild west version of the internet has turned into cities and suburbs where hacking still takes place but there … Read more The Evolution of Hacking and Security – From Bindshells to Reverse Shells
Cyber Security Analysts and Specialist alike have noticed a significant downward trend in the number of infections being reported. This doesn’t mean that the Crimeware bosses have packed up shop and gone legit. There are many contributing factors to the current number of infections. Reviewing many of the largest security solution providers logs and examining … Read more Malware Has Not Gone Away Like Some People Think
Where has all the Malware gone? 2015 has been the year of a series of major down trends of malware infections. The largest contributor in the decline of infections is based on a few significant factors. The hay days of exploit kits and Java 0-days seems to be at an all time low for the … Read more Where has all the Malware gone?
SSDP Distributed Reflection Denial of Service attacks are on the rise and may be the biggest threat right now. SSDP attacks do not have the biggest amplification number but they may have the most vulnerable systems to abuse in a reflection attack. Open source reports indicate that there are over 5 million vulnerable systems … Read more SSDP Distributed Reflection Denial of Service (DrDoS) Attacks may be biggest threat – Traffic Sample & Snort Rule
This is the first video of the Computer forensics course (tutorial) at Duckademy. To do computer forensics, understanding the NTFS file system and the inner workings of resident and non-resident files is a must. To DOWNLOAD the evidence files and the commands used in the video go to http://www.duckademy.com The goal of the Computer forensic … Read more NTFS file system: understanding resident and non-resident files for Computer forensics – Cyber Security Video