FBot arms threat actors with a multi-function attack tool designed to hijack cloud, Saas and web services. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware,…
Tag: SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
LABScon Replay | Spectre Strikes Again: Introducing the Firmware Edition
Binarly’s CEO Alex Matrosov dives deep into the fascinating world of speculative attacks against System Management Mode (SMM) on AMD-based devices. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on…
LABSCon Replay | Intellexa and Cytrox: From Fixer-Upper to Intel Agency Grade Spyware
Vitor Ventura breaks down the processes one spyware organization takes to develop fully working spyware using a one-click zero-day exploit. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the…
Gaza Cybergang | Unified Front Targeting Hamas Opposition
Cluster of threat groups continues on trajectory to consolidate with shared victims, TTPs and evolving malware. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits,…
Sandman APT | China-Based Adversaries Embrace Lua
SentinelLabs, Microsoft, and PwC threat intelligence researchers provide attribution-relevant information on the Sandman APT cluster. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs,…
LABScon Replay | The Cyber Arm of China’s Soft Power: Reshaping a Continent
Tom Hegel explores China’s influence in Africa and highlights an opportunity for broader understanding of global cyber threat landscapes. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world…
Decoding the Past, Securing the Future | Enhancing Cyber Defense with Historical Threat Intelligence
Explore how revisiting past cyber incidents can empower defenders and help to anticipate future threats more effectively. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware,…
Predator AI | ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms
An emerging infostealer being sold on Telegram looks to harness generative AI to streamline cyber attacks on cloud services. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world…
Arid Viper | APT’s Nest of SpyC23 Malware Continues to Target Android Devices
Hamas-aligned threat actor delivers spyware through weaponized apps posing as Telegram or Skipped messenger. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and…
11 Ways to Tweak radare2 for Faster and Easier macOS Malware Analysis
Simplifying radare2 for macOS malware research, these tips and tricks will help to improve workflow and supercharge productivity. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of…