all InfoSec news
Bellingcat Malware Investigation - "The sequence of events results in deploying an HTTP reverse shell based on an open-source offensive security tool which enabled the threat actors to harvest and exfiltrate a potential victim’s sensitive data"
March 29, 2024, 8:59 a.m. | /u/digicat
For [Blue|Purple] Teams in Cyber Defence www.reddit.com
bellingcat blueteamsec data events harvest http investigation malware offensive offensive security offensive security tool results reverse reverse shell security sensitive sensitive data shell threat threat actors tool victim
More from www.reddit.com / For [Blue|Purple] Teams in Cyber Defence
How malware authors play with the LNK file format
2 days, 14 hours ago |
www.reddit.com
The Best Way to Start with AWS Security Hub
2 days, 16 hours ago |
www.reddit.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC