Advertisement · 728 × 90

Posts by j04n

Épisode magistral! Pour rebondir humblement sur la séquence de la « B team » de 1976 : parfait exemple de la difficulté à gérer adéquatement les biais en matière d’analyse du renseignement. Au motif de vouloir combattre les présupposés analytiques des bureaucraties en place… (1/7)

3 months ago 16 4 1 1

#ESETresearch has discovered #HybridPetya ransomware on VirusTotal: a UEFI-compatible copycat of the infamous Petya/NotPetya malware. HybridPetya is capable of bypassing UEFI Secure Boot on outdated systems. www.welivesecurity.com/en/eset-rese... 1/8

7 months ago 11 11 1 0
Post image

Join #ESETResearch's Damien Schaeffer at PivotCon 2025 for "Hello Zebrocy, my old friend!" on May 8 at 2pm CEST in Malaga. @dmnsch.bsky.social 1/4

11 months ago 12 6 1 0
Preview
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks ESET researchers publish an analysis of Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks.

#ESETResearch analyzed the toolset of the China-aligned APT group that we have named #TheWizards. It can move laterally on compromised networks by performing adversary-in-the-middle (AitM) attacks to hijack software updates. www.welivesecurity.com/en/eset-rese... 1/6

11 months ago 20 12 2 0

Super article, ça fait très plaisir de te lire de nouveau :-)

1 year ago 1 0 0 0

#ESETresearch discovered + named 🇨🇳 China-aligned #APT group #PlushDaemon who did a supply-chain compromise of a 🇰🇷 South Korean #VPN provider, trojanizing its legitimate software installer with a Windows backdoor we named #SlowStepper www.welivesecurity.com/en/eset-rese...
🧵1/6

1 year ago 17 14 1 2