99 Followers
161 Following
1.4K Posts
Practical Malware Analysis - Lab Write-up

This details reverse engineering activities and answers for labs contained in the book ‘Practical Malware Analysis’ by Michael Sikorski and Andrew Honig, which is published by No Starch Press.

Jai Minton
Cars Have Your Location. This Spy Firm Wants to Sell It to the U.S. Military https://www.vice.com/en/article/k7adn9/car-location-data-telematics-us-military-ulysses-group
Cars Have Your Location. This Spy Firm Wants to Sell It to the U.S. Military

15 billion car locations. Nearly any country on Earth. ‘The Ulysses Group’ is pitching a powerful surveillance technology to the U.S. government.

Chinese cyberspies go after telco providers, 5G secrets

https://therecord.media/chinese-cyberspies-go-after-telco-providers-5g-secrets/

Chinese cyberspies go after telco providers, 5G secrets | The Record by Recorded Future

A Chinese cyber-espionage group has shifted operations from targeting Vatican officials and Catholic organizations to telecom providers across Asia, Europe, and the US.

Using Syscalls to Inject Shellcode on Windows

https://www.solomonsklash.io/syscalls-for-shellcode-injection.html

Using Syscalls to Inject Shellcode on Windows - SolomonSklash.io

A small proof of concept Windows shellcode injector using syscalls.

ME:(i said

I have already said on my twitter profile that we will see two worlds in the future! High-tech countries headed by the United States (democracy, the West) and countries with centralized high-tech internal cycles headed by China (Southeast Asia, Asia, Russia)

China plans for a world without American tech. A commentary from Ni Guangnan said it all, he called for a "China system" of computing as dominant as Wintel and for China to grow global reliance on its 5G tech as a countermeasure to US tech

https://www.nytimes.com/2021/03/10/business/china-us-tech-rivalry.html

-----------------------------------------------------

Xi’s Gambit: China Plans for a World Without American Technology

Beijing’s leaders plot a path to go it alone, vowing to spend big to fill gaps in innovation and avoid dependence on the United States and others.

The New York Times
Inside Israel’s lucrative — and secretive —cybersurveillance industry

At age 18, K., like almost all Israelis, began his mandatory army service. “This was my way to give back to society and defend my country,” he says. “I was one of them. I was one of the radical ones.”…

"You Do (Not) Understand Kerberos" slides and (spanish) video available in my blog! (english video soon)

Hope you enjoyed!

https://attl4s.github.io

ATTL4S

Freshly Squeezed

上海交通大学研究人员发表了七篇论文
#公安部研究了机器学习的应用软件的静态漏洞分析。50漏洞分析发现可以由防御者或被攻击者利用;漏洞使用后如何使用发现取决于用户。另一篇论文提出了一个机器可以区分Tor Web流量与其他流量的学习模型

信息内容分析技术国家工程实验室
—重点介绍 #使用AI修复软件漏洞,支持网络攻击和防御,并查找软件漏洞恶意软件开发过程中的利用。54件通过提出两个论点来得出结论。

杨,将他的研究描述为“数据驱动的AI智能网络威胁检测和“猎人”防御系统; #基于AI和大数据分析的检测加密流量中的恶性肿瘤;基于机器学习加密的流量(#SSL#Tor#VPN#ShadowSocks)/专用互联网协议识别和调查;数据分析与机器基于学习的网络空间虚拟角色识别,匹配,和调查。