-
According to investigation of sansec.io
https://sansec.io/research/polyfill-supply-chain-attack
the library polyfill.io became compromised and lead potential security risks of malware injection
[Ba…
-
* Research the software and OS's being used on the network that was targeted by the APT 32: Operation Cobalt Kitty
* Research the malware used to compromise the victim network
* Research the manage…
-
I am trying to install ChurchCRM and following the shared cpanel instructions - went the subdirectory route. But, when I go to access it, I get a partial blue spinning circle and nothing else.
htt…
-
**The Problem**
Security Analyst are constantly in a need for Fresh Malware Samples.
The fight against malware is largely driven by ML Models that use static, or dynamic analysis. This is a large…
-
Since of most of us would be doing home office, is there any plan to revive this project?
An open source tool will help immensely in research against malware that will try to use this name. There alr…
-
The layout-f6 template is using the malicious polyfill dot io domain.
https://github.com/2pisoftware/cmfive-core/blob/9a9ca769d26285c17a899356b6f445ac0f2304d9/system/templates/layout-f6.tpl.php#L12…
-
Per email from Davide Cervone on the mathjax-dev google groups list (Wednesday, June 26, 2024 at 8:01 AM):
```
Folks:
In the past, MathJax has recommended including a tag that refers to polyf…
-
https://joddiy.github.io/blog/2018/12/18/dynamic-malware-research/
This post summaries 8 papers on dynamic malware detection domain.
-
While using some of the apps i saw that malware detection service has detected some connections as malware and blocked it. These apps were mostly crypto related which i had downloaded through official…
-
Possible design goals
- Detectable malware
- Stealthy malware
- APT-like malware
- Design undetectable malware
Use cases
- Reverse obfuscated or otherwise stealthy malware
- Detect malware by traditi…