APT35: Inside the Structure, Toolset, and Espionage Operations of an IRGC-Linked Group https://gbhackers.com/apt35/ #CyberSecurityNews #cybersecurity #APT35 #APT

APT35: Inside the Structure, Toolset, and Espionage Operations of an IRGC-Linked Group https://gbhackers.com/apt35/ #CyberSecurityNews #cybersecurity #APT35 #APT
Cavalry Werewolf APT Targets Russian Organizations Using FoalShell and Telegram C2 https://gbhackers.com/cavalry-werewolf-apt/ #CyberSecurityNews #cybersecurity #Telegram #APT
In case you want to ship your software as #APT/#Debian package, you can find a number of examples here:
https://github.com/starwit-trainings/debian-package-examples
So far there are some #Python examples, but I consider doing also some with #Rust. Stay tuned - #FOSS rulez!
Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware https://www.securityweek.com/chinese-apt-phantom-taurus-targeting-organizations-with-net-star-malware/ #PhantomTaurus #Nation-State #espionage #ChinaAPT #malware #NetStar #China #APT
Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware https://www.securityweek.com/chinese-apt-phantom-taurus-targeting-organizations-with-net-star-malware/ #PhantomTaurus #Nation-State #espionage #ChinaAPT #malware #NetStar #China #APT
Chinese APT #PhantomTaurus breached MS Exchange servers over 3 years, using fileless backdoors and memory loaders to spy on diplomatic and military data.
Read: https://hackread.com/chinese-apt-phantom-taurus-ms-exchange-servers/
Patchwork APT: Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload https://gbhackers.com/patchwork-apt/ #CyberSecurityNews #cybersecurity #PowerShell #APT
New Chinese Nexus APT Group Targeting Organizations to Deploy NET-STAR Malware Suite https://gbhackers.com/nexus-apt-group/ #CyberSecurityNews #cybersecurity #NexusAPT #APT
APT35 Hackers Targeting Government and Military to Steal Login Credentials https://gbhackers.com/apt35-hackers/ #CyberSecurityNews #cybersecurity #APT35 #APT
Buenos días red!! TZAG!
Nuevo video en nuestro canal de YouTube!!
¿Sabías que desde Debian 13 los repositorios se configuran usando el formato Deb822 por default?
En este video vemos en qué consiste este formato, y cómo migrar desde el anterior formato de una línea.
Esperamos que les guste y les resulte útil!
Wenn Cyberspionage zur Industrialisierung wird ... China treibt sein APT-Programm auf die nächste Ebene – mit einem hybriden Modell aus staatlicher Steuerung und privatwirtschaftlicher Umsetzung. Salt Typhoon agiert seit mindestens 2019 im Dienste des Ministeriums für Staatssicherheit. Ziel: globale Telekommunikationsinfrastruktur infiltrieren, Signal- und Metadaten ausspähen, dauerhaften Zugriff etablieren. #CyberSecurity #APT #China #spionage #Hackerangriff #Cybercrime
Hmm interesting their guide already has it with a "[ trusted=yes ] " so why does #apt on #debian even check the key then? shouldn't it just work despite the expired key then?
Also interesting there are #debian forum pages stating that "apt-key del $keyid" followed by having the "[trusted=yes]" in the sources.list should work.
So why doesn't it?!?
Planning to hunt New-Zealand's #APT-Landscape during my Holiday just so I can name one "Humble Taumatawhakatangihangakoauauotamateaturipukakapikimaungahoronukupokaiwhenuakitanatahu"
Google China-linked hackers (#UNC5221) are targeting US SaaS and tech firms using the new BRICKSTORM malware, exploiting zero-day flaws, Mandiant has found.
Read: https://hackread.com/china-hackers-hit-us-tech-firms-brickstorm-malware/
COLDRIVER APT Group Uses ClickFix to Deliver New PowerShell-Based Backdoor BAITSWITCH https://gbhackers.com/coldriver-apt-group/ #CyberSecurityNews #cybersecurity #PowerShell #APTgroup #APT
Least but certainly not last, DomainTools threat profile of the Chinese APT threat actor Salt Typhoon.
Exceptionally detailed report that covers... a lot of ground. Enjoy and thank you @DomainTools for this most excellent read!
https://dti.domaintools.com/inside-salt-typhoon-chinas-state-corporate-advanced-persistent-threat/