- OneNote Yara rule
- Qu1cksc0pe - All-in-One malware analysis tool
- What are your go-to websites to read cybersecurity news in 2023?
- Days of Yara Master list
- Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice
- New Exchange Zero Day rumours [29th September]
- Company woke up this morning to a ransomware attack. Infected every computer connected to the network and all virtual servers, including a backup server isolated from the main network. Any advice on looking for its entry point?
- Završio/la si TVZ? Još sutra traju prijave za networking događaj Alumnijada 2022 (četvrtak 29.9.2022.)
- What is your opinion about "app packers"? Should Google ban their use?
- [P] I developed a machine learning based malware classification system
- What is the use of an Av when it can be bypassed easily?
- Radi li iko u cybersecurity sektoru?
- protections-artifacts: 1000 Yara rules and 200 endpoint behaviour rules released for free
- Yara4Ida IDA plugin - Crypto/hash/encryption dumper
- Open source tools and DFIR Tryhackme equivalents
- FBI Director Christopher Wray says agency blocked planned cyberattack on children's hospital
- Yara which Detects DLL dropped by Raspberry Robin.
- Where do I find at least somewhat detailed information about famous data breaches/Hacks?
- Python Script EXE detected as virus in VT
- IoCs and YARA rules for Industroyer2
- What are some good resources for staying up to date with current APT developments?
- Russia-Ukraine Cyberwar 2022
- Ukraine curated cyber intel
- GitHub - curated-intel/Ukraine-Cyber-Operations: Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
- Ukraine Cyber Operations: Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence.
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. (github/curated-intel)
- Collection of Ukraine related OSINT
- Nvidia Breach
- Detection - Threat Detection Rules (Snort/Sigma/Yara)
- GitHub - JPCERTCC/jpcert-yara: JPCERT/CC public YARA rules repository - detect APT10, APT29, BlackTech, Darkhotel, DragonOK, Lazarus, Tick and others
- GitHub - JPCERTCC/jpcert-yara: JPCERT/CC public YARA rules repository
- StrangerealIntel/Orion: A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...
- Orion: A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...
- Evidence of a log4j attack found - Now what?
- Extracting attachments from saved emails (.eml)
- Yara rules to look for Log4J usage
- ELI5: what is happening with .NET and is it likely to impact on us?
- FalconScrape Hack
- GitHub - PwCUK-CTO/TheSAS2021-Red-Kelpie: Indicators of compromise, YARA rules, and Python scripts to supplement the TheSAS2021 talk "Learning to ChaCha with Red Kelpie"
- Indicators of Compromise, YARA rules, and Python scripts for the Kaspersky TheSAS2021 talk "Learning to ChaCha with APT41"
- Ar kaip nors reaguojate po NKSC pranešimo apie saugumo rizikas susijusias su Huawei; Xiaomi telefonais.
- Ask HN: Are most security breaches based on social engineering?
- Yara rule to detect ProxyToken exploitation
- Incident report collection
- Resources to defend ransomware
- Netfilter Rootkit Samples Spreadsheet from Florian - the signed Windows kernel driver rootkits
- Ars Technica | Newly discovered Vigilante malware exposes software pirates and blocks them
- Ars Technica | New Vigilante malware Exposes Pirates and Blocks them
- APT29 / NOBELIUM VirusTotal retro hunt results using 12 newly release Yara rules
- blackeko/PEpper - An open source script to perform malware static analysis on Portable Executable