Summary
— A collection of infosec links to Tools & Tips, Threat Research, and more! The focus trends toward DFIR and threat intelligence, but general information security and hacking-related topics are included as well. This list is not vetted nor intended to be an exhaustive source. Keeping up with the enormous volume of security-related information is a daunting task, but this is my way of filtering the most useful items and improving the signal to noise ratio. The summaries are provided with links for the reader to drill down into particular topics according to their own interests.
Industry Reports, News, and Miscellany
- Broadcom in advanced talks to buy Symantec
- All 2019 Sp4rkCon Talks uploaded to Youtube.
- ‘Twas the night before (APT33 Report)
- Where Do CISOs Belong in the IT Org Chart?
- Phishing Number One Cause of Data Breaches: Lessons from Verizon DBIR
- When Math and Science Collide: Using Artificial Intelligence at NSA
- Similarities and differences between MuddyWater and APT34
- The Accidental Infosec Mentor
- A Fierce Domain – Documents on Key Events in Cyber History (From the NSA archives)
- The Value of Community in InfoSec
- Microsoft Defender ATP alert categories are now aligned with Mitre ATT&CK
- YouTube’s Ban of Hacking Videos Moves Us Closer to an Entertainment-only Public Sphere
Tools and Tips
- A Quick and Efficient Method For Locating the main() function of Linux ELF Malware Variants
- Using Powershell in Basic Incident Response – A Domain Wide “Kill-Switch”
- Blocking DNS over HTTPS
- Security Primer – TrickBot
- Try Harder! My Penetration Testing with Kali Linux OSCP Review and course/lab experience — My OSCP Review | by Jason Bernier
- Sysmon in a Box
- amass — Automated Attack Surface Mapping
- Persistence with KeePass – Part 1
- Persistence with KeePass -Part 2
- awesome-reversing: A curated list of awesome reversing resources
- Bloodsport: Using Games and CTFs to Improve your Industry Skills
- Incident Response and IoC
- Writing shellcodes for Windows x64
- Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update
- Bypassing Email Security Controls (P1: URL Scanning)
- Preventing Lateral Movement
- PSDecode v4 Released
- THOR 10 Fusion Released
Threat Research – Malware, Phishing, and other Campaigns in the Wild
- LooCipher: The New Infernal Ransomware
- Taking Over the Overlay: What Triggers the AVLay Remote Access Trojan (RAT)?
- Unwrapping Fishwrap, a New Social Media Misinformation Methodology
- BianLian: A New Wave Emerges
- Sodin ransomware exploits Windows vulnerability and processor architecture
- TA505 begins summer campaigns with a new pet malware downloader, AndroMut, in the UAE, South Korea, Singapore, and the United States
- Latest Spam Campaigns from TA505 Now Using New Malware Tools Gelup and FlowerPippi
- Operation Tripoli: a large-scale campaign using Facebook pages to spread malware
- RATs and stealers rush through “Heaven’s Gate” with new loader
- WATCH WHERE YOU BROWSE – THE FALLOUT EXPLOIT KIT STAYS ACTIVE
- Hancitor Campaigns Delivering Cobalt Strike as a Payload
- FlawedAmmyy and the Case for Isolation
- Threat Spotlight: Ratsnif – New Network Vermin from OceanLotus
- Threat Spotlight: Sodinokibi Ransomware
- An Analysis of Godlua Backdoor
- OSX/CrescentCore: Mac malware designed to evade antivirus
- ANATOMY OF A SYN-ACK ATTACK
Vulnerabilities and Exploits
- CVE-2019–13142: Razer Surround 1.1.63.0 EoP
- Vulnerability Spotlight: Google V8 Array.prototype memory corruption vulnerability
- GOTCHA: Taking phishing to a whole new level
- The Curious Case of QueueUserAPC
Breaches, Government, and Law Enforcement
- Contractor’s server exposes data from Fortune 100 companies: Ford, Netflix, TD Bank
- LinkedIn is becoming China’s go-to platform for recruiting foreign spies
- Operationalizing Cyberspace as a Military Domain | Lessons for NATO
- US Military Warns Companies to Look Out for Iranian Outlook Exploits
- FBI Releases Warning on Sextortion Scams Targeting Teenagers