#APTS

2026-01-09

🎥Watch the video recording of the talk: “Operational Twilight: APTs, OT, and the geopolitics of a dying climate.” from Adversary Village at @defcon 33 Creator Stage, delivered by Cybelle O., Cyber Threat Intelligence Researcher at Malwarelandia.
youtu.be/Ekp5iMPEgVw?si=lZMd2Z

#AdversaryVillage #DEFCON33 #AccessEverywhere #APTs #OTSecurity #ThreatIntelligence #AdversaryTradecraft

:awesome:🐦‍🔥nemo™🐦‍⬛ 🇺🇦🍉nemo@mas.to
2025-12-15

I wonder if it is possible and what would happen if any #APTs would combine #BlobURL #Bypass and this: cyberplace.social/@GossiTheDog. Any ideas? 🤔 Probably nothing good, for sure…

2025-10-24

In diesem praxisorientierten Training lernen Sie die Grundlagen der IT- und Informationssicherheit kennen. Profitieren Sie von der über 20-jährigen Erfahrung unseres Trainers, der Ihnen aktuelle und relevante Einblicke bietet.

In unserer zweitägigen Schulung stehen folgende Themen im Mittelpunkt:
- Grundbegriffe der IT- und Informationssicherheit
- Unterschied zwischen IT-Sicherheit und Datenschutz
- Aktuelle Bedrohungen und Angriffstechniken
- Social Engineering und die Cyber Kill Chain
- Schadprogramme: Funktionsweisen und Schutzstrategien
- Advanced Persistent Threats (APTs) und DDoS-Angriffe
- Schutzmaßnahmen und Strategien zur Risikominderung
- Zero-Trust-Ansätze und effektives Richtlinien-Management
- Schwachstellen- und Patch-Management
- Systemhärtung und Netzwerkzugangskontrolle
- Risikomanagement und Sicherheitsstandards
- Grundlagen der Risikobewertung und relevante Standards (z.B. ISO 27001)
- Einführung in das Security Incident Management
Nach dem Training sind Sie in der Lage, zentrale Begriffe der IT-Sicherheit zu verstehen, Bedrohungen für Ihr Unternehmen realistisch einzuschätzen und passende Maßnahmen abzuleiten.
Sichern Sie sich jetzt Ihren Platz und legen Sie das Fundament für eine sichere IT! 💪🔒

cirosec.de/trainings/crashkurs

#crashkurs #ITSicherheit #Informationssicherheit #Datenschutz #CyberSecurity #Bedrohungen #Angriffstechniken #SocialEngineering #Malware #Schutzstrategien #APTs #DDoS #ZeroTrust #Netzwerksicherheit #ISO27001.

In diesem praxisorientierten Training lernen Sie die Grundlagen der IT- und Informationssicherheit kennen. Profitieren Sie von der über 20-jährigen Erfahrung unseres Trainers, der Ihnen aktuelle und relevante Einblicke bietet.

In unserer zweitägigen Schulung stehen folgende Themen im Mittelpunkt:
- Grundbegriffe der IT- und Informationssicherheit
- Unterschied zwischen IT-Sicherheit und Datenschutz
- Aktuelle Bedrohungen und Angriffstechniken
- Social Engineering und die Cyber Kill Chain
- Schadprogramme: Funktionsweisen und Schutzstrategien
- Advanced Persistent Threats (APTs) und DDoS-Angriffe
- Schutzmaßnahmen und Strategien zur Risikominderung
- Zero-Trust-Ansätze und effektives Richtlinien-Management
- Schwachstellen- und Patch-Management
- Systemhärtung und Netzwerkzugangskontrolle
- Risikomanagement und Sicherheitsstandards
- Grundlagen der Risikobewertung und relevante Standards (z.B. ISO 27001)
- Einführung in das Security Incident Management
Nach dem Training sind Sie in der Lage, zentrale Begriffe der IT-Sicherheit zu verstehen, Bedrohungen für Ihr Unternehmen realistisch einzuschätzen und passende Maßnahmen abzuleiten.
Sichern Sie sich jetzt Ihren Platz und legen Sie das Fundament für eine sichere IT! 💪🔒

👾 #Lumma, #Remcos, and #XWorm became the top uploaded threats in Q2 2025.

From top #malware to active #APTs, Malware Trends Report for Q2 '25 has all the intel every SOC needs to make smarter decisions.

👨‍💻 Read now: any.run/cybersecurity-blog/mal

#cybersecurity #infosec

Ars Technica Newsarstechnica@c.im
2025-07-31

Microsoft catches Russian hackers targeting foreign embassies arstechni.ca/sdF8 #secretblizzard #embassies #Security #Biz&IT #russia #apts

🚨 From top #malware to active #APTs, Malware Trends Report for Q2 '25 has all the intel every SOC needs to make smarter decisions.

See key threats to businesses and prepare for the next attack before it's too late.
👨‍💻 Read now: any.run/cybersecurity-blog/mal

#cybersecurity #infosec

2025-07-24

#BREAKING #ESETResearch has been monitoring the recently discovered #ToolShell zero-day vulnerabilities in #SharePoint Server: CVE-2025-53770 and CVE-2025-53771. SharePoint Online in Microsoft 365 is not impacted. welivesecurity.com/en/eset-res
ESET first detected an attempt to exploit part of the execution chain on July 17 in Germany 🇩🇪. Here, the final #webshell payload was not delivered. The first time we registered the payload was on July 18 in Italy 🇮🇹. We have since seen active ToolShell exploitation all over the world.
We have uncovered several IP addresses that were used in the attacks from July 17 to July 22. The charts show the timeline of the attacks from the three most active of these IP addresses.
ToolShell is being exploited by all sorts of threat actors, from petty cybercriminals to state-sponsored groups, among them China 🇨🇳-aligned #APTs. We expect these attacks to continue taking advantage of unpatched systems.
IoCs available in our GitHub repo: github.com/eset/

📢 Malware Trends Report for Q2 '25 is here.
See key threats to businesses, prepare for the next attack before it's too late.

From top #malware to active #APTs, it has all the intel every SOC needs to make smarter decisions.

Get it now 👇
any.run/cybersecurity-blog/mal

#cybersecurity #infosec

EuskalHackeuskalhack
2025-06-20

Comienza la ponencia de Marc Rivero "Lumma Stealer: El Auge del Malware-as-a-Service y la Industria del Cibercrimen" para examinar un ejemplo de
Malware-as-a-Service (MaaS) @Seifreed

ForeNova Technologiesforenova
2025-04-11

"HOW DID WE MISS THIS FOR 9 YEARS?"

That's what Volkswagen executives asked after discovering hackers had stolen 19,000 R&D documents back in 2015—a breach they only discovered in 2024.

The uncomfortable truth about Advanced Persistent Threats (APTs) is in the name: PERSISTENT.

2025-03-25

With all the talk about the use of #Signal by government officials in the US, it's worth remembering #ThreatActors will target what they need to steal the data they want.

Google's Threat Intelligence Group published details last month of Russian #APTS targeting #Signal

➡️ Maliciously getting victims to scan QR codes
➡️ Maliciously cloning incoming messages with a Linked Device
➡️ Stealing the message database off a device

🔗 cloud.google.com/blog/topics/t

📢 New! Threat Intelligence Reports from ANYRUN

Discover detailed research on active cyber threats and #APTs with actionable insights, #IOCs, & #TTPs

Enrich proactive security, report on #APT41 inside ⬇️
any.run/cybersecurity-blog/thr

#cybersecurity #infosec #threatintel

☠️ Evasive #APTs can be hard to identify
TI Lookup solves this with critical context for attack indicators and intel to help prevent future attacks

See how with #APT41 & #MuddyWater examples ⬇️
any.run/cybersecurity-blog/tra

#cybersecurity #infosec

VIDEO: BSidesNYC 2024 - From HiatusRAT to Cuttlefish advances in credential theft through the router - Danny Adamitis & Ryan English - Black Lotus Labs

youtube.com/watch?v=Oi-x_YPtHZ

#BSidesNYC #BsidesNYC2024 #bsidesnyc0x04 #cybersecurity #InfoSec #HiatusRAT #Cuttlefish #APTs

Hunt & Hacketthuntandhackett
2024-12-05

Country Threat Profile:

Discover Russia’s cyber threat landscape, including insights into high-profile attacks, Advanced Persistent Threats (), and their use of Techniques, Tactics, and Procedures () alongside sophisticated attack tools.

Access the full report now through our Members’ Portal: huntandhackett.com/members/reg

Lori | @writingcyberwritingcyber@infosec.exchange
2024-10-24

Dropping this week on Innovate Cybersecurity
#cybersecurity #APTs

Breaking Down Iranian State Cyber Threats
Just Another Blue TeamerLeeArchinal@ioc.exchange
2024-09-25

Happy Wednesday everyone!

This resources has been popping up on my feed everywhere so I took a look at it and I see why! When he is not instructing the #SANS FOR589, Will Thomas is creating highly valuable resources like the Russian APT Tool Matrix.

Will has taken the time to correlate the tools of Russian #APTs such as #CozyBear and #Sandworm and even supplied the aliases that go along with them as well. This is a great resource if you are an organization who is APT focused to prioritize your threat hunting! Thanks a ton Will!

Enjoy and Happy Hunting!

Russian APT Tool Matrix:
github.com/BushidoUK/Russian-A

Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #readoftheday #HappyHunting Cyborg Security, Now Part of Intel 471

Hunt & Hacketthuntandhackett
2024-06-27

2️⃣ When dealing with large-scale cybersecurity incidents, such as or Advanced Persistent Threats (), traditional incident response methods rooted in digital forensics are no longer sufficient. This is because, traditionally, large amounts of data are acquired over several days before an investigation can begin.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst