#tiandirposts — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #tiandirposts, aggregated by home.social.
-
The SOC files: Rumble in the jungle or APT41’s new target in Africa – Source: securelist.com https://ciso2ciso.com/the-soc-files-rumble-in-the-jungle-or-apt41s-new-target-in-africa-source-securelist-com/ #rssfeedpostgeneratorecho #APT(Targetedattacks) #CyberSecurityNews #Targetedattacks #DLLsideloading #securelistcom #CobaltStrike #DLLhijacking #TIandIRposts #Incidents #APT #SOC
-
Rumble in the jungle: APT41’s new target in Africa – Source: securelist.com https://ciso2ciso.com/rumble-in-the-jungle-apt41s-new-target-in-africa-source-securelist-com/ #rssfeedpostgeneratorecho #APT(Targetedattacks) #CyberSecurityNews #Targetedattacks #DLLsideloading #securelistcom #CobaltStrike #DLLhijacking #TIandIRposts #Incidents #APT #SOC
-
Forensic journey: Breaking down the UserAssist artifact structure – Source: securelist.com https://ciso2ciso.com/forensic-journey-breaking-down-the-userassist-artifact-structure-source-securelist-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #Digitalforensics #IncidentResponse #MicrosoftWindows #Researcherstools #Cybersecurity #securelistcom #threathunting #TIandIRposts #research #SOC
-
Host-based logs, container-based threats: How to tell where an attack began – Source: securelist.com https://ciso2ciso.com/host-based-logs-container-based-threats-how-to-tell-where-an-attack-began-source-securelist-com/ #rssfeedpostgeneratorecho #Compromiseassessment #CyberSecurityNews #Internalthreats #Cybersecurity #securelistcom #threathunting #TIandIRposts #containers #docker #SOC
-
Dero miner zombies biting through Docker APIs to build a cryptojacking horde – Source: securelist.com https://ciso2ciso.com/dero-miner-zombies-biting-through-docker-apis-to-build-a-cryptojacking-horde-source-securelist-com/ #rssfeedpostgeneratorecho #Compromiseassessment #MalwareDescriptions #MalwareTechnologies #UnixandmacOSmalware #CyberSecurityNews #Cryptocurrencies #Financialthreats #securelistcom #TIandIRposts #containers #Malware #docker #LINUX #Miner #SOC
-
Outlaw cybergang attacking targets worldwide – Source: securelist.com https://ciso2ciso.com/outlaw-cybergang-attacking-targets-worldwide-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #UnixandmacOSmalware #CyberSecurityNews #IncidentResponse #Cybersecurity #securelistcom #TIandIRposts #botnets #Malware #Outlaw #Miner #SOC #ssh
-
Lumma Stealer – Tracking distribution channels – Source: securelist.com https://ciso2ciso.com/lumma-stealer-tracking-distribution-channels-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Cryptocurrencies #IncidentResponse #Windowsmalware #securelistcom #Trojanstealer #Infostealers #Malvertizing #TIandIRposts #Phishing #Telegram #CAPTCHA #Malware #Trojan #Lumma #SOC
-
Lumma Stealer – Tracking distribution channels – Source: securelist.com https://ciso2ciso.com/lumma-stealer-tracking-distribution-channels-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Cryptocurrencies #IncidentResponse #Windowsmalware #securelistcom #Trojanstealer #Infostealers #Malvertizing #TIandIRposts #Phishing #Telegram #CAPTCHA #Malware #Trojan #Lumma #SOC
-
Lumma Stealer – Tracking distribution channels – Source: securelist.com https://ciso2ciso.com/lumma-stealer-tracking-distribution-channels-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Cryptocurrencies #IncidentResponse #Windowsmalware #securelistcom #Trojanstealer #Infostealers #Malvertizing #TIandIRposts #Phishing #Telegram #CAPTCHA #Malware #Trojan #Lumma #SOC
-
Lumma Stealer – Tracking distribution channels – Source: securelist.com https://ciso2ciso.com/lumma-stealer-tracking-distribution-channels-source-securelist-com/ #rssfeedpostgeneratorecho #MalwareDescriptions #MalwareTechnologies #CyberSecurityNews #Cryptocurrencies #IncidentResponse #Windowsmalware #securelistcom #Trojanstealer #Infostealers #Malvertizing #TIandIRposts #Phishing #Telegram #CAPTCHA #Malware #Trojan #Lumma #SOC
-
Streamlining detection engineering in security operation centers – Source: securelist.com https://ciso2ciso.com/streamlining-detection-engineering-in-security-operation-centers-source-securelist-com/ #rssfeedpostgeneratorecho #detectionengineering #CyberSecurityNews #Cybersecurity #securelistcom #TIandIRposts #0CISO2CISO #SIEM #SOC
-
A journey into forgotten Null Session and MS-RPC interfaces – Source: securelist.com https://ciso2ciso.com/a-journey-into-forgotten-null-session-and-ms-rpc-interfaces-source-securelist-com/ #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #Offensivecybersecurity #securityassessment #CyberSecurityNews #Cybersecurity #securelistcom #TIandIRposts #research #pentest #SOC