emulation
-
Intro Welcome to the May 2023 SCYTHE #ThreatThursday! This edition features an emulation based on Agent Tesla malware.
-
Welcome to the June 2023 #ThreatThursday! This month’s plan is based on the PaperCut MF/NG vulnerability which allowed for unauthenticated remote code execution. Security researchers at Huntress were tracking post-exploitation activities within their partner environments and put together a nice write-up documenting their findings – check it out here!
-
Welcome to the July 2023 SCYTHE #ThreatThursday! This edition features an APT-36 plan based on Poseidon malware research from Uptycs.
-
Mounting cybersecurity threats against operational technology networks have prompted the Cybersecurity and Infrastructure Security Agency and MITRE’s Homeland Security Systems Engineering and Development Institute to collaborate in the development of a new OT cyberattack emulation platform, according to The Record, a news site by cybersecurity firm Recorded Future.
-
During my journey into reverse engineering, I stumbled upon a valuable technique: partial binary emulation while dissecting the Mirai IoT Botnet. This malicious software utilized a custom algorithm to obfuscate both its configuration and all strings within it. As the malware executed, it dynamically decrypted these strings through a specific function.As I delved deeper into…
-
Denuvo has become the first security partner to be added to the Nintendo Developer Portal
-
Target Audience The target audience for this blog post is individuals who have a basic understanding of cybersecurity concepts and terminology and looking to expand their knowledge on adversary emulation. This post delves into the details of adversary emulation with the Caldera framework exploring the benefits it offers. By catering to a beginner to intermediate…