https://ftp.bit.nl/pub/debian/ #SecurityResearchers #PublicDirectory #OpenSourceCode #CEOPrivacy #FreeAudit #HackerNews #ngated
Dear "Security Researchers"
https://ftp.bit.nl/pub/debian/
#HackerNews #SecurityResearchers #SecurityCommunity #Cybersecurity #Research #Ethics #TechNews
#huntr provides a single place for #securityresearchers to submit #vulnerabilities, to ensure the security & stability of #AI/ #ML #applications, incl. those powered by Open Source Software (OSS).
SliverC2 Test + old code which still working...
this C# code was for 2019-2020 and i talked about that in my ebook "Bypassing AVs by C#.NET Programming v1.0" (Published in 2016 up to 2020 , free) but code still working on Windows Defender with (update 2023/08/28) , a little bit code changed by me which you can see in video , VirtualProtectEx added for changing RWX to X...
but in this new test, as you can see "Sliver-C2" (which i still think is much better than CobaltStrike) changed X Protection Mode to RW "in-Memory" by itself (not by my code), yeah Sliver-c2 done it and this will help you as penteser/redteamer to bypass almost all Avs and you as Blue teamer should learn how Attackers will bypass your defensive tools by these Simple/Advanced techniques... these things are very important for Defenders and in my new ebook "Bypassing AVs By C# Programming v2.0" , i will talk about these things to defenders/blue teamers also #redteamers and #pentesters or #SecurityResearchers etc.
btw this code is old and available in my github for ebook v1.0
also you can see Cobaltstrike test video here: https://lnkd.in/eCyxjN6m
#blueteam #pentester #redteam #offensivesecurity #defensivesecurity #ebook #av #protectionmode #inmemory #sliverc2
Video: this C# code was for 2019-2020 and i talked about that in my ebook "Bypassing AVs by C#.NET Programming v1.0" (Published in 2016 up to 2020 , free) but…
@conansysadmin #TTX scenario idea - Your #devops team is at a #cybersecurity conference, and after dinner is sitting in a bar having a few drinks and loose-tongue talking "anonymously and confidentially" to other people who are "#securityresearchers"
Anonymously == while wearing their badges
hardwear.io (https://hardwear.io/usa-2023/):
🛰️Calling out #hardwarehackers #securityresearchers to share your latest research not just limited to embedded systems security, IoT, 💽integrated circuits
⚠️Call for Paper is open till 10th Aug ⌚https://t.co/JDD8L7LSME
#hw_ioNL2023 #CFP #embeddedsecurity #Conference https://t.co/f0jRVvEioz
NULLCON (http://nullcon.net):
👏200+ #CFP submissions! 🤝We welcome our review board members for Nullcon Goa 2023 as their journey begins now to spot the best research work
🙌Thank you to all the #securityresearchers for submitting your papers!⚠️Acceptance email will begin from 20th July
💻Not just an #infostealer…
#securityresearchers have been busy over the weekend linking #3CX #supplychain attacks to a more formidable #backdoor pattern with another infamous North Korean threat actor group, #lazarus
https://securelist.com/gopuram-backdoor-deployed-through-3cx-supply-chain-attack/109344/
#NorthKorean #hackers target #SecurityResearchers with a new #backdoor | #ArsTechnica
"#ThreatActors connected to the North Korean government have been targeting #security #researchers in a hacking campaign that uses new techniques and #malware in hopes of gaining a foothold inside the companies the targets work for, researchers said.
Researchers from security firm #Mandiant said on Thursday that they first spotted the campaign last June while tracking a phishing campaign targeting a #US-based customer in the #technology industry. The hackers in this campaign attempted to infect targets with three new malware families, dubbed by Mandiant as #Touchmove, #Sideshow, and #Touchshift. The hackers in these attacks also demonstrated new capabilities to counter endpoint detection tools while operating inside targets’ #cloud environments."
North Korean hackers target security researchers with a new backdoor
Campaign uses carefully crafted LinkedIn accounts that mimic legit people.
#NorthKorea #SecurityResearchers #LinkedIn
https://arstechnica.com/information-technology/2023/03/security-researchers-are-again-in-the-crosshairs-of-north-korean-hackers/