Wellan

1.4K posts

Wellan

Wellan

@Wellan129

Katılım Ekim 2013
411 Takip Edilen119 Takipçiler
Wellan retweetledi
Daniel Lunghi
Daniel Lunghi@thehellu·
Our latest report on a CN #APT targeting tens of governments entities worldwide has been published 🥳 After monitoring it for a long time we realized it is likely related to the recent I-Soon company leaks. It discusses their TTPs and provides lots of IOCs trendmicro.com/en_us/research…
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
1
47
112
14.5K
Wellan retweetledi
Pierre Le Bourhis
Pierre Le Bourhis@plebourhis·
I am glad to share, my latest analysis on #DiceLoader, the network part related to the linked lists was a can of worms but it was really instructive. 🎲
Sekoia.io@sekoia_io

We are pleased to announce our newest article on #DiceLoader, one of the #malware used by #FIN7. The post dives in the loader arcana to cover multiple aspects such data structures, threading related mechanisms, and much more! blog.sekoia.io/unveiling-the-…

English
0
4
12
1.3K
Wellan retweetledi
Goupil
Goupil@FuraxFox·
Si vous vous intéressez à la réponse à incident cyber, après près de 3 ans d'échanges, consultations, discussions: les guides de l'ANSSI sur la remédiation sont en ligne: cyber.gouv.fr/piloter-la-rem…
Français
1
26
52
4.6K
Wellan retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
In a paper also presented at #VB2023, Sekoia's Erwan Chevalier & Guillaume Couchard look into infection chains used by commodity malware and how generic detection rules can help in the fight against botnets. blog.sekoia.io/when-a-botnet-…
Virus Bulletin tweet media
English
0
23
42
6.7K
Wellan retweetledi
billy leonard
billy leonard@billyleonard·
Recent WinRAR vuln exploited by actors from 🇷🇺 targeting 🇺🇦 and 🇨🇳 targeting 🇵🇬! Nice write up on the vuln from @Google TAG folks and summary of recent campaigns! APT4⃣0⃣ should be getting more attention than they do.. blog.google/threat-analysi…
English
2
62
100
42.3K
Wellan retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
🇬🇧 Next week, #VB2023 conference takes place in London! 🎤 #TDR analysts will be on stage for 2 talks: 1️⃣ When a botnet cries: detecting botnet infection chains @r1chev @Wellan129 2️⃣ Infostealers: investigate the cybercrime threat in its ecosystem @liviatibirna @plebourhis
Sekoia.io tweet media
English
0
8
11
1.2K
Wellan retweetledi
James D
James D@FranticTyping·
The first part of my blog series on how we’ve been scaling detection and response operations at Coinbase is live! Interested in speeding up your investigations, increasing the visibility of key data sources, and improving quality of life for analysts? coinbase.com/blog/scaling-d…
English
3
22
121
11.4K
Wellan retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft has identified targeted attacks against the defense sector in Ukraine and Eastern Europe by the threat actor Secret Blizzard (KRYPTON, UAC-0003) leveraging DeliveryCheck, a novel .NET backdoor used to deliver a variety of second stage payloads. msft.it/6019gfoYU
English
3
140
254
71K
Wellan retweetledi
Cleafy LABS
Cleafy LABS@cleafylabs·
🚨 During the last 3 years, we have tracked a specific TA intending to infect Windows workstations on corporate environments, trying to alter legitimate banking transfers performed by the victims. Meet drIBAN. 💉 Chapter 1: cleafy.com/cleafy-labs/un… #drIBAN #sLoad #Ramnit
Cleafy LABS tweet media
English
0
7
10
1.4K
Wellan retweetledi
Kostas
Kostas@Kostastsale·
Today, me and @ateixei are releasing the EDR Telemetry project. This project aims to compare and evaluate the telemetry of various EDR products. ✅Introductory blog post: t.ly/9Ia3 ✅GitHub Repo: github.com/tsale/EDR-Tele… ✅Comparison Table: t.ly/HMht
English
45
328
810
169.2K
Wellan
Wellan@Wellan129·
Thank you #botconf2023! Was a great event with great people 🙂 My first time there and first time ever being a speaker at a conference but definitely not the last time! See you in Nice ;)
English
0
1
6
310