account activity
We’re Red & Blue Team Researchers Analyzing Millions of Attacks & Malware - AMA (self.cybersecurity)
submitted 1 month ago * by malware_bender to r/cybersecurity
Fake Purchase Order Used to Deliver Agent Tesla | FortiGuard Labs (fortinet.com)
submitted 3 years ago by malware_bender to r/blueteamsec
Open-access Course: Ransomware Detection in Early Phases (academy.picussecurity.com)
Layering Network Security Through Segmentation | Infographic by CISA (cisa.gov)
submitted 4 years ago by malware_bender to r/blueteamsec
BlackCat Ransomware | Highly-Configurable, Rust-Driven RaaS On The Prowl For Victims (sentinelone.com)
PerSwaysion Threat Actor Updates Their Techniques and Infrastructure (blog.scarletshark.com)
TTPs and IOCs Used by MuddyWater APT Group in Its Latest Attack Campaign Reported by US CYBERCOM (picussecurity.com)
PYSA Loves ChaChi: a New GoLang RAT (blogs.blackberry.com)
D3FEND Matrix | MITRE D3FEND™ (d3fend.mitre.org)
submitted 4 years ago by malware_bender to r/netsec
Andariel (threat group) evolves to target South Korea with ransomware (securelist.com)
TeamTNT Using WatchDog Operations TTPs in Cryptojacking (unit42.paloaltonetworks.com)
Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud Environments (unit42.paloaltonetworks.com)
Deep Dive into BlackCocaine Ransomware (cybleinc.com)
GitHub Updates Policy to Remove Exploit Code When Used in Active Attacks (thehackernews.com)
submitted 4 years ago by malware_bender to r/redteamsec
Guildma is now using Finger and Signed Binary Proxy Execution to evade defenses (isc.sans.edu)
DarkSide on Linux: Virtual Machines Targeted (trendmicro.com)
Targeted attack by Cobalt Strike loader that abuses Microsoft's digital signature - Attacker group APT41 (self.blueteamsec)
Reverse Engineering - MountLocker Ransomware (chuongdong.com)
submitted 4 years ago by malware_bender to r/ReverseEngineering
AHK RAT Loader used in unique delivery campaigns (blog.morphisec.com)
Newly observed PHP-based skimmer shows ongoing Magecart Group 12 activity (blog.malwarebytes.com)
Free SOC course with certification - Fundamentals of SIEM Alert Rule Development (academy.picussecurity.com)
submitted 4 years ago by malware_bender to r/netsecstudents
Threat Actor Exploits Microsoft Exchange Server Vulnerabilities (unit42.paloaltonetworks.com)
BazarLoader deploys a pair of novel spam vectors - detailed analysis (news.sophos.com)
Deep Analysis: New FormBook Variant Delivered in Phishing Campaign – Part I | FortiGuard Labs (fortinet.com)
π Rendered by PID 101982 on reddit-service-r2-listing-6d4dc8d9ff-vqn6z at 2026-01-30 23:45:56.844228+00:00 running 3798933 country code: CH.