Aggregator
APT attacks taking aim at Tibetans – Week in security with Tony Anscombe
Secure by Design: Google’s Perspective on Memory Safety
反序列化详解
妇女节快乐,发点活动
3.8妇女节 | 愿你们快乐,不止是今天
Hunting for Fortinet's CVE-2024-21762
CIS Benchmarks March 2024 Update
VMware by Broadcom and Pwn2Own Vancouver 2024
Update May 14, 2024 Today, VMware has released the following new security advisory: VMSA-2024-0010 – VMware Workstation and Fusion updates address multiple security vulnerabilities (CVE-2024-22267, CVE-2024-22268, CVE-2024-22269, CVE-2024-22270) The advisory documents the remediation of the Critical and Important severity vulnerabilities demonstrated at the Pwn2Own 2024 hacking contest. Customers should review the security advisory and direct … Continued
The post VMware by Broadcom and Pwn2Own Vancouver 2024 appeared first on VMware Security Blog.
Enhance Customers? Security Posture: Akamai SOCC Advanced Service
谛听| “谛听”团队林小李博士的论文被《Sustainable Energy, Grids and Networks》期刊录用
Blue Team Diaries E011: Josh Stroschein
Welcome to episode 11 of the Blue Team Diaries! In this episode, our host Peter Manev engages in a conversation with Dr. Josh Stroschein, Reverse Engineer @ FLARE with Google, as they delve into the world of malware analysis.
In this episode, you’ll learn:
- Essential environments: Explore popular options like Remnix and Flare VM to set up your secure analysis workspace.
- Powerful tools: Discover functionalities of Olefile, oledump, and Cyber Chef used to dissect and decode suspicious files.
- Valuable resources: Gain access to helpful materials like Josh’s GitHub repository and curated malware sample libraries.
The world of malware analysis can be daunting, but with the right guidance and tools, you can start chipping away at the mystery behind malicious files. Listen to this episode, because Dr. Josh Stroschein will equip you with the foundational knowledge to become a threat-hunting hero.
About Josh Stroschein
Josh is an experienced malware analyst and reverse engineer and has a passion for sharing his knowledge with others. He is a reverse engineer at Google (Chronicle), where he focuses on tackling the latest threats. Josh is an accomplished trainer, providing training at places such as Ring Zero, BlackHat, Defcon, Toorcon, Hack-In-The-Box, Suricon, and other public and private venues. Josh is also an author on Pluralsight, where he publishes content around malware analysis, reverse engineering, and other security related topics.
Where to find Josh Stroschein?
- The Cyber Yeti - https://www.thecyberyeti.com
- LinkedIn - https://www.linkedin.com/in/joshstroschein
Evasive Panda leverages Monlam Festival to target Tibetans
猎影追踪:新勒索家族出现,Donex公布多名受害者信息
404星链计划 | 一大波项目版本更新
2023软件工程领域顶会fuzz技术研究相关论文汇总|技术进展
Cobalt Strike Infrastructure Downtime – March 2024
The Cobalt Strike download infrastructure will be down for a short while on Wednesday 13th March for routine maintenance. Work will begin around 15:00 GMT (10:00 EST). We expect the maintenance to be completed in under 30 minutes. Downloads and updates will be unavailable while this work is carried out. Apologies for any inconvenience that [...]
Read More... from Cobalt Strike Infrastructure Downtime – March 2024
The post Cobalt Strike Infrastructure Downtime – March 2024 appeared first on Cobalt Strike.