Kerberos protocol security

I have a question in my mind regarding the inner workings of Kerberos protocol. If the generation of the session key is somehow insecure, does this compromise the security of the Kerberos protocol?...

Information Security Stack Exchange
What are some symptoms of malware exfiltrating data in packet captures?

I am concerned that my Linux laptop has been compromised with malware that is remotely and regularly monitoring my activity. I ran Wireshark for a day to see if I could find any symptoms of data be...

Information Security Stack Exchange
What are the indications on my smartphone that I have security problem/data leak/trojan

I am using a paid (non-free) antivirus on my Android 13. I am curious however, what would be the signs/"symptoms" in case I have data leakage/security issues/trojan on my smartphone? How ...

Information Security Stack Exchange

@pixelnull Could be an idea to actually write it out as #IndicatorOfCompromise because there are multiple things that shorten to IOC and not all of them are relevant to us :)

We have way more chars to work with in our posts here, after all!

#emotet now uses #powershell commands in .lnk files, the string is obfuscated with nulls/blank spaces so the target is not shown
some #Indicatorofcompromise #ioc :
- .ps1 files in %tmp%
- focusmedica[.]in
- demo34[.]ckg[.]hk
- colegiounamuno[.]es
- cipro[.]mx
- filmmogzivota[.]rs
- creemo[.]pl
command for checking %tmp%:
 dir C:\users\%username%\AppData\Local\Temp\*.ps1
Woran Administratoren eine Kompromittierung ihrer Maschinen mit der Ransomware Lockbit 2.0 erkennen, erläutert das FBI in einer aktuellen Anleitung.
FBI gibt Hilfestellung zur Erkennung von Lockbit-Befall
FBI gibt Hilfestellung zur Erkennung von Lockbit-Befall

Woran Administratoren eine Kompromittierung ihrer Maschinen mit der Ransomware Lockbit 2.0 erkennen, erläutert das FBI in einer aktuellen Anleitung.

heise online