Demystifying threat intelligence in digital advertising - includes their own pyramid of pain
digicat @ digicat @infosec.pub Posts 282Comments 15Joined 2 yr. ago

Exorcism: The first open source runtime windows batch and command line deobfuscator
IOCTL_VOLSNAP_DELETE_SNAPSHOT: Querying And Deleting Shadow Copies Using The IOCTL_VOLSNAP_QUERY_NAMES_OF_SNAPSHOTS & IOCTL_VOLSNAP_DELETE_SNAPSHOT IOCTLs
Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
Quantum networking technologies - "we provide an updated analysis of QKD as a security technology, and the development of QRNGs. We also consider the future of quantum networking technologies."
Tracing ToneShell: Mustang Panda's Evolving Tradecraft and Campaign Infrastructure
APT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoor
Protecting the Evidence in Real-Time with KQL Queries - "monitoring for attempts to modify the corresponding registry keys can help us generate early alerts and detect potential tampering."
DHS Launches Over $100 Million in Funding to Strengthen Communities’ Cyber Defenses | CISA
PlayPraetor's evolving threat: How Chinese-speaking actors globally scale an Android RAT
How to automatically disable users in AWS Managed Microsoft AD based on GuardDuty findings
Investigating Suspicious Memory Activity: Tracing a SIEM Alert to a Cobalt Strike C2
Memory Forensics Attack Simulation Dataset - " a curated memory forensics dataset designed to support research, detection engineering, and hands-on training in the fields of malware analysis, incident