China-linked Evasive Panda used DNS poisoning to deliver the MgBot backdoor in targeted espionage attacks from 2022 to 2024.
Cybercriminals have rapidly pivoted to a new evasion technique following Microsoft’s recent crackdown on malicious email attachments. Just weeks after Outlook began blocking inline Scalable Vector ...
Cybersecurity researchers are warning of a new phishing campaign that's targeting users in Taiwan with malware families such as HoldingHands RAT and Gh0stCringe. The activity is part of a broader ...
In this blogpost, ESET researchers provide an analysis of Spellbinder, a lateral movement tool for performing adversary-in-the-middle attacks, used by the China-aligned threat actor that we have named ...
ESET researchers discovered a previously unknown vulnerability in Mozilla products, exploited in the wild by Russia-aligned group RomCom. This is at least the second time that RomCom has been caught ...
Leveraging AI to help analyze and visualize data gathered from a variety of data sets enables data-driven insights and fast analysis without the high costs of talent and technology. In today's ...
Abstract: Shellcodes are malicious code fragments which are usually executed after exploitation of particular vulnerability. Such shellcodes can be packed within a binary in a form of payload and ...
Pull requests help you collaborate on code with other people. As pull requests are created, they’ll appear here in a searchable and filterable list. To get started, you should create a pull request.
A small program to load 32-bit shellcode and allow for execution or debugging. Can also output PE files from shellcode. This tool combines several shellcode analysis capabilities, often found in ...
Abstract: Memory corruption attacks still play a significant role in present cybercrime activities, being one of the keystones for worm, virus propagation and building botnets. Moreover,recent ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results