all InfoSec news
Network-based IOC s for the current Ivanti attacks, these were collected from a ton of MISP feeds and other threat intelligence platforms. Hope this helps someone out
Feb. 16, 2024, 7:11 p.m. | /u/Proof-Requirement-41
cybersecurity www.reddit.com
domain gpoaccess.com Suspected UTA0178 domain discovered via domain registration patterns
domain webb-institute.com Suspected UTA0178 domain discovered via domain registration patterns
domain symantke.com UTA0178 domain used to collect credentials from compromised devices
domain symantke.com WARPWIRE C2 server
domain miltonhouse.nl WARPWIRE variant C2 server
domain entraide-internationale.fr WARPWIRE variant C2 server
domain clickcom.click WARPWIRE variant C2 server
domain clicko.click WARPWIRE variant C2 server
domain duorhytm.fun WARPWIRE variant C2 server
domain line-api.com WARPWIRE variant C2 server
domain areekaweb.com WARPWIRE variant C2 …
attacks collect compromised credentials current cybersecurity domain hope intelligence ioc ivanti misp network patterns platforms registration threat threat intelligence threat intelligence platforms ton value webb
More from www.reddit.com / cybersecurity
How does hiring in APT groups work?
16 hours ago |
www.reddit.com
State of WiFi Security in 2024
17 hours ago |
www.reddit.com
Prioritize Blue Team for Cybersecurity Success
19 hours ago |
www.reddit.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Security Compliance Strategist
@ Grab | Petaling Jaya, Malaysia
Cloud Security Architect, Lead
@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)