Advertisement · 728 × 90

Posts by L²

Preview
GreyNoise Observes Active Exploitation of Critical Apache Tomcat RCE Vulnerability (CVE-2025-24813) Attackers are actively exploiting Apache Tomcat servers by leveraging CVE-2025-24813. If successfully exploited it could enable remote code execution. GreyNoise has identified multiple IPs engaging in...

🚨Active Exploitation Alert: Critical Apache Tomcat RCE (CVE-2025-24813). Majority of traffic targeting U.S.-based systems. Full analysis & attacker IPs⬇️
#ApacheTomcat #Apache #GreyNoise #Vulnerability #CVE202524813

1 year ago 13 6 1 0
Post image

Trump administration does not believe Russia represents a cyber threat against US national security or critical infrastructure? www.theguardian.com/us-news/2025...

1 year ago 36 17 2 5
How Long Can a Vulnerable Server Stay Clean on the Internet? A Honeypot Tale – Securite360

How long can a vulnerable server stay clean on the internet? A honeypot tale. #malware #miner #redtail

🔗 securite360.net/how-long-can...

1 year ago 4 1 0 0
Post image

#BREAKING Europe's security is at a 'turning point': EU chief

1 year ago 44 15 3 2

A lire absolument, pour ceux qui souhaitent comprendre l'ampleur de ce que les #databrokers obtiennent comme info sur les internautes.

#adint #cybercriminalité #sensibilisation

Merci #LeMonde pour cet excellent article.

www.lemonde.fr/pixels/artic...

1 year ago 10 4 3 1
Preview
ScatterBrain: Unmasking the Shadow of PoisonPlug's Obfuscator | Google Cloud Blog We been tracking multiple espionage operations conducted by China-nexus actors utilizing POISONPLUG.SHADOW malware.

The blog feels like a retro FLARE blog from the good old FireEye days!

Shout out to Nino Isakovic, @qutluch.bsky.social and @lukejenx.bsky.social

cloud.google.com/blog/topics/...

1 year ago 12 4 1 0
Deobfuscation of Lumma Stealer Introduction

Deobfuscation of Lumma Stealer

ryan-weil.github.io/posts/LUMMA-...

#malware #infosec #stealer #writeup

1 year ago 1 1 0 0

ReversingLabs researchers have identified 18 malicious VSCode extensions available through the official VSCode Marketplace.

As soon as the extensions were removed from the VSCode Marketplace, the attacker uploaded similar malicious projects on the npm portal.

www.reversinglabs.com/blog/a-new-p...

1 year ago 28 13 0 0
Advertisement
Post image

Spotting PLA activity is rare - every opportunity to investigate matters. Dive in #Nomadpanda #RedFoxtrot #Quickheal #malware securite360.net/a-painful-qu...

1 year ago 2 3 0 0

In relation to the RDP phish campaign detailed below: Not sure it's been mentioned, but apparently both the Swedish and Norwegian governments were at least on the target list, judging by these phish domains.

regeringskansliet-se[.]cloud
dep-no[.]cloud

#infosec #apt

microsoft.com/en-us/security/b…

1 year ago 2 1 1 0
Preview
Stark Industries Solutions: An Iron Hammer in the Cloud Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distr...

An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia.
krebsonsecurity.com/2024/05/star...

1 year ago 5 4 0 0
Preview
Damage to Baltic Sea submarine cables: Why suspicion is focusing on a Chinese vessel Le Monde has reconstructed the itinerary of the Yi-Peng 3, revealing why this merchant ship, currently immobilized between Sweden and Denmark, is the number one suspect in the damage caused to two sub...

Why is a Chinese ship suspect in the damage to Baltic Sea cables? @lemonde.fr has reconstructed the itinerary of the Yi Peng 3, revealing that this merchant ship, now idle between Sweden and Denmark, was precisely sailing above the cables at the time they broke—sometimes down to the exact second.

1 year ago 20 4 1 0
Preview
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

Russian spies—likely Russia's GRU intelligence agency—used a new trick to hack a victim in Washington, DC: They remotely infected another network in a building across the street, hijacked a laptop there, then breached the target organization via its Wifi. www.wired.com/story/russia...

1 year ago 577 326 12 46
About Apple threat notifications and protecting against mercenary spyware - Apple Support Apple threat notifications are designed to inform and assist users who may have been individually targeted by mercenary spyware.

If you're part of civil society and received an Apple notification. The Amnesty Security Lab would be happy to test your phone!

The Apple notification looks like this: support.apple.com/en-us/102174

The Security Lab can be contacted here: securitylab.amnesty.org/get-help/

1 year ago 28 25 0 0
Preview
An Infostealer Searching for « BIP-0039 » Data - SANS Internet Storm Center

An Infostealer Searching for « BIP-0039 » Data isc.sans.edu/diary/31464

1 year ago 6 3 0 0
Post image

Podcast: risky.biz/RBNEWS364/
Newsletter: news.risky.biz/risky-biz-ne...

-US charges five Scattered Spider members
-Apple fixes macOS zero-days
-T-Mobile finally stops a breach
-US takes down PopeyeTools carding portal
-Thailand throws out NSO lawsuit
-Microsoft develops something dumb, part 9,136

1 year ago 20 10 1 0
Post image

A few months' old post but maybe still relevant securite360.net/unveiling-sh...

1 year ago 1 0 0 0
Une grenouille et ses têtards

Une grenouille et ses têtards

Pour nos prochaines rencontres cyber, nous sommes à la recherche de doctorants volontaires pour parler de leurs travaux (cybersecurité ou manipulation de l'information/réseaux sociaux)
Rejoignez nous pour les "têtards" !
contact@m82-project.org

2 years ago 2 7 0 0
Advertisement
Post image

[CTI insights]

The latest Qakbot payload distributed happened to be packed by the Dave crypter. The DLL decrypts a resource containing Dave's encrypted shellcode and executes it! (cf. securityintelligence.com/x-force/tric...)

2 years ago 2 2 1 0
Aki-RATs - Command and Control Party

Last piece from our CERT, on Akira this time ✍

2 years ago 1 0 0 0

Happy to share our new CTI report about Lumma stealer 🕵‍♂️

2 years ago 1 0 0 0
Post image

Last friday, we published a report on GuLoader targeting the energy sector in 🇫🇷 and elsewhere.

This report, initially drafted in July for our client, has been recently updated to include new victims we identified.

www.intrinsec.com/wp-content/u...

2 years ago 4 0 0 0
Post image

New #Bumblebee campaign leveraging CVE-2023-38831
Botnet ID : is0210
RC4 key : NEW_BLACK
C2 : g7qf7ew5c[.]life
TTPs : .RAR -> .EXE

2 years ago 1 1 1 0