-
We could use something like https://github.com/fhightower/malware_name_mapping to parse malware names from text.
-
Hi!
Upon running mitmproxy windows installer to download mitimproxy Avast antivirus is giving **Win32:Malware-gen** warning and blocking it. Is mitmproxy windows installer malware affected?
Tha…
-
### Issue URL (Ads)
[https://www.washingtonpost.com/world/asia_pacific/vietnamese-families-say-migrants-were-lured-to-europe-with-promise-of-work--and-found-tragedy-instead/2019/10/28/af2e6610-f9ad…
-
I have a Scan Policy XML file that uploads just fine in the SC GUI, but using the pyTenable SC.policies.import_policy function, it gives an error. I did further testing by exporting the policy file vi…
-
It would be really useful to test for these particular malware families. The [abuse.ch tracker](https://feodotracker.abuse.ch/browse/) shows the active C2s that we can use, and the CSV we can use is a…
-
The current STM32 mcu's have easy to reproduce hack metodology - https://www.aisec.fraunhofer.de/en/FirmwareProtection.html.
I think stm32 mcu's are dangerous for key storage.
-
Hello.
I am new to MITRE CTI and STIX. What I can't find, is how to get examples from a particular technique. For example, if we follow this link: https://attack.mitre.org/techniques/T1214/ we can s…
-
ransomware/backdoor is missing
-
http://s2.textlab.io/store/data/001398694.pdf?key=b2b1f47367309e88f9aa9787840bcf19&r=1
---
FROM SEOUL TO SONY:
THE HISTORY OF THE DARKSEOUL GROUP
AND THE SONY INTRUSION MALWARE
DESTOVER
By Snorre Fa…
-
Enhanced malware capabilities will create enhancements to STIX (new objects, new properties on existing objects) to capture more in-depth malware analysis information. The intent is to capture much or…