Aggregator
开发了一个代替 xshell 的轮子 - VEX
3 Things CFOs Need to Know About Mitigating Threats
netspionage: Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection
Flocker
You must login to view this content
Flocker
You must login to view this content
CISA open-sources Thorium platform for malware, forensic analysis
“生成式人工智能安全”专题征稿
Everest
You must login to view this content
OnlyFans, Discord ClickFix-Themed Pages Spread Epsilon Red Ransomware
Hakrawler: Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
NCorr-FP基于邻域的数据库指纹水印方案分析
Aqaba Special Economic Zone Authority Falls Victim to Qilin Ransomware
Attackers actively exploit critical zero-day in Alone WordPress Theme
Raspberry Pi притворился системным администратором и обманул крупный банк
英伟达宣布了结束旧架构 GPU 驱动支持的时间表
Microsoft: Kremlin monitors foreign embassies in Moscow through cyber-espionage at ISP level
Microsoft: Russian hackers use ISP access to hack embassies in AiTM attacks
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats
Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard that has been ongoing since at least 2024, targeting embassies in Moscow using an adversary-in-the-middle (AiTM) position to deploy their custom ApolloShadow malware.
The post Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats appeared first on Microsoft Security Blog.
Russia-affiliated Secret Blizzard conducting ongoing espionage against embassies in Moscow
A new Microsoft report finds that the long-running threat group has gained positions on state-aligned ISPs and Russian telecoms, while tricking foreign embassy staff to download custom malware.
The post Russia-affiliated Secret Blizzard conducting ongoing espionage against embassies in Moscow appeared first on CyberScoop.