Winnti Abuses GitHub for C&C Communications
...1e63a7186886deea6c4e5c2a329eab76a60be3a65bca1ba9ed6e71f9a46b7e9d – loadperf.dll 7c37ebb96c54d5d8ea232951ccf56cb1d029facdd6b730f80ca2ad566f6c5d9b – loadoerf.ini 9d04ef8708cf030b9688bf3e8287c1790023a76374e43bd332178e212420f9fb — wbemcomn.ini b1a0d0508ee932bbf91625330d2136f33344ed70cb25f7e64be0620d32c4b9e2 — cryptbase.ini e5273b72c853f12b77a11e9c08ae6432fabbb32238ac487af2fb959a6cc26089 — wbemcomn.dll Post from: Trendlabs Security Intelligence Blog – by Trend Micro Winnti Abuses GitHub for C&C... more…Blackgear Cyberespionage Campaign Resurfaces, Abuses Social Media for C&C Communication
...Blackgear (also known as Topgear and Comnie) is a cyberespionage campaign dating back to 2008, at least based on the Protux backdoor used by its operators. It targets... more…The Dropping Elephant actor
...gaokaonewschedule_2.pps fa2f8ec0ab22f0461e860394c6b06a68 harbin_1.pps 9a0534772ac23ff64e3c85b18fbec596 Heart_Valve_Replacement.doc 4ea4142bab2b90e5779df19616f7d8ca Implication_China_mil_reforms_1.doc 8a350d3f6fb359377d8939e1a2e033f3 Implication_China_mil_reforms_1.pps f5e121671384fbd43534b8515c9e6940 ISIS_Bet_Part1.doc 3a83e09f1b751dc08f4b719ed51c3fbc ISIS_Bet_Part2.doc 8a1a10dcc6e2ac6b40a86d6ed20cf1bd japan_pivot_1.pps 72c05100da6b6bcbf3f96fee5cf67c3f japan_pivot_2.pps ebe8efbad7f01b76465afaf474589c2f jtopcentrecomn.pps 165ae88945852a37fca8ec5224e35188 korea1.pps 38e71afcdd6236ac3ad24bda393a81c6 militarizationofsouthchinasea_1.pps 61f812a1924e6d5b4307313e20cd09d1 militarizationofsouthchinasea_2.pps 4595dbaeec06e3f9b466d618b4da767e MilitaryReforms1.pps 1de10c5bc704d3eaf4f0cfa5ddd63f2d MilitaryReforms2.pps ce1426ffe9ad4439795d269ddcf57c87... more…The Dropping Elephant – aggressive cyber-espionage in the Asian region
...915e5eefd145c59677a2a9eded97d114 gaokaonewreforms_1.doc 57377233f2a946d150115ad23bbaf5e6 gaokaonewschedule_1.pps 1c5b468489cf927c1d969484ddbdd8ea gaokaonewschedule_2.pps fa2f8ec0ab22f0461e860394c6b06a68 harbin_1.pps 9a0534772ac23ff64e3c85b18fbec596 Heart_Valve_Replacement.doc 4ea4142bab2b90e5779df19616f7d8ca Implication_China_mil_reforms_1.doc 8a350d3f6fb359377d8939e1a2e033f3 Implication_China_mil_reforms_1.pps f5e121671384fbd43534b8515c9e6940 ISIS_Bet_Part1.doc 3a83e09f1b751dc08f4b719ed51c3fbc ISIS_Bet_Part2.doc 8a1a10dcc6e2ac6b40a86d6ed20cf1bd japan_pivot_1.pps 72c05100da6b6bcbf3f96fee5cf67c3f japan_pivot_2.pps ebe8efbad7f01b76465afaf474589c2f jtopcentrecomn.pps 165ae88945852a37fca8ec5224e35188 korea1.pps 38e71afcdd6236ac3ad24bda393a81c6 militarizationofsouthchinasea_1.pps 61f812a1924e6d5b4307313e20cd09d1 militarizationofsouthchinasea_2.pps... more…Kam dál?
- Courier Scammers Intercept Text Messages, Leave Traces on Google Play
- Microsoft Internet Explorer CVE-2014-6341 Remote Memory Corruption Vulnerability
- 75 Percent of Bluetooth Smart Locks Can Be Hacked
- Smart Whitelisting Using Locality Sensitive Hashing
- Obama vows to punish Russia over election-related hacks
- 12 security problems that EMV and tokenization won’t solve
- Are Attacks Against SWIFT Acts of Cyberwar?
- Java flaws already included in Blackhole exploit kit, Oracle was informed of vulnerabilities in April
- Microsoft dragging its feet on Linux Secure Boot fix
- Critial XSS flaws in Magento leave millions of ecommerce sites at risk