It sure is!
It sure is!
Excited that we @volexity.com are able to share a writeup of one of our most interesting incidents! This case involves:
* A 0-day exploit
* Physical trips to the customer site to determine root cause
* Compromise via Wi-Fi.
www.volexity.com/blog/2024/11...
#nearestneighbor #threatintel
#ESET research has identified #Linux malware samples, one of which we named #WolfsBane and attribute with high confidence to #Gelsemium. This π¨π³ China-aligned APT group, active since 2014, has not previously been publicly reported to use Linux malware. www.welivesecurity.com/en/eset-rese... π§΅(1/6)
WIRED has tracked thousands of US military & intel personnel coming & going from classified sites, incl. NSA hubs & nuclear vaults. We know where they sleep, what they eat, and which brothels they visit.
It's an ocean of blackmail & national secrets within reach of every spy agency in the world.
Post a pic YOU took to bring some zen to the timeline.
How does the new iOS inactivity reboot work? What does it protect from?
I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.
naehrdine.blogspot.com/2024/11/reve...
What sample is that on your IDA
Israel-linked hacker group Predatory Sparrow has carried out some of the most disruptive hacking of civilian targets ever. Yet they also claim to limit their cyberattacks' harm. I dug into the recent history of this hyper-aggressive, contradictory player in cyberwar.
www.wired.com/story/predat...
The Three Buddy Problem podcast Episode 19 just published! We explore Ivan Kwiatkowskiβs essay on the limits of threat intel, Sophos using kernel implants to surveil Chinese hackers, the concept of βhack-backβ, geopolitical layers of cyber espionage&more: securityconversations.com/episode/the-...
Sophos engineers preparing their revenge against the Chengdu hackers #PacificRim