FYI: From John: Unlocking Privilege Escalation in EntraID: The Essentials https://www.youtube.com/watch?v=wJHUXDQUMO4&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
FYI: From John: Unlocking Privilege Escalation in EntraID: The Essentials https://www.youtube.com/watch?v=wJHUXDQUMO4&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
ICYMI: From John: Unlock Your Cybersecurity Potential with Hands-On Labs https://www.youtube.com/watch?v=418RGE1HmfU&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
From John: Create Dynamic User Groups in M365: Step-by-Step Guide https://www.youtube.com/watch?v=PZPOOP0VVMM&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
FYI: From John: Exposing Vulnerabilities in EntraID: Ethical Hacking Insights https://www.youtube.com/watch?v=MTIShUmdlns&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
ICYMI: From John: Unlocking Privilege Escalation in EntraID: The Essentials https://www.youtube.com/watch?v=wJHUXDQUMO4&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
From John: Unlock Your Cybersecurity Potential with Hands-On Labs https://www.youtube.com/watch?v=418RGE1HmfU&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
FYI: From John: Essential Steps to Secure Your Entra Admin Center https://www.youtube.com/watch?v=CBn-1RxBzXs&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
ICYMI: From John: Exposing Vulnerabilities in EntraID: Ethical Hacking Insights https://www.youtube.com/watch?v=MTIShUmdlns&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
From John: Unlocking Privilege Escalation in EntraID: The Essentials https://www.youtube.com/watch?v=wJHUXDQUMO4&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
My friends at Ravenfortech wrote an introductory #malwareanalysis post on the INC #Ransomware:
https://translate.kagi.com/https://scribe.rip/@ravenfortech/inc-ransomware-elemz%C3%A9s-a909b5aed114
This gang recently pwned the Hungarian company responsible for military procurement (VBÜ) and now selling the data for $1M.
Based on the analysis the malware is very simple. INC uses 2023 CitrixBleed (2023) and spear phishing for initial access:
https://www.sentinelone.com/anthology/inc-ransom/
This doesn’t paint a picture of mature security at VBÜ to say the least…
FYI: From John: Unlock Your Potential: The Ultimate Guide to Altered Security Certifications https://www.youtube.com/watch?v=v4QnuESZZDs&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
ICYMI: From John: Essential Steps to Secure Your Entra Admin Center https://www.youtube.com/watch?v=CBn-1RxBzXs&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
From John: Exposing Vulnerabilities in EntraID: Ethical Hacking Insights https://www.youtube.com/watch?v=MTIShUmdlns&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
FYI: From John: Unlocking Dynamic Groups: Efficient User Management Strategies https://www.youtube.com/watch?v=a2JO5MS3JFw&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
ICYMI: From John: Unlock Your Potential: The Ultimate Guide to Altered Security Certifications https://www.youtube.com/watch?v=v4QnuESZZDs&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
From John: Essential Steps to Secure Your Entra Admin Center https://www.youtube.com/watch?v=CBn-1RxBzXs&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
Information Stealer malware remains one of the most active and dangerous threats in the wild. In this blog, #Splunk Threat Research Team #STRT, dive into Braodo Stealer, a Python-based malware designed to steal sensitive information while leveraging a popular developer platform to distribute its payload. We’ve analyzed its techniques, tactics, and procedures (TTPs) and shared the detection strategies we developed to combat this threat. Additionally, we took a closer look at its batch script loader, which employs layered obfuscation to complicate analysis and reverse engineering. To counter this, we created a custom Python de-obfuscation tool, which we detail in this post. #reverseengineering #blueteam #detectionengineering #incidentresponse #splunk #malwareanalysis .
de-obfuscator tool:
https://lnkd.in/du2n7Gh8
Braodo Stealer Blog:
https://lnkd.in/d6bZ5AAX
FYI: From John: Hacking Microsoft 365: Maintain Access Like a Pro https://www.youtube.com/watch?v=N3gS37skRqQ&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
ICYMI: From John: Unlocking Dynamic Groups: Efficient User Management Strategies https://www.youtube.com/watch?v=a2JO5MS3JFw&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity
From John: Unlock Your Potential: The Ultimate Guide to Altered Security Certifications https://www.youtube.com/watch?v=v4QnuESZZDs&utm_source=dlvr.it&utm_medium=mastodon ( :-{ı▓ #pentesting #malwareanalysis #cybersecurity