Aug. 29, 2023, 1:50 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

An in-depth analysis of the activities and capabilities of the Lapsus$ hacking and extortion group found that its members mainly used well-known tactics and techniques in its operations and took advantage of known weaknesses in enterprise networks and the procedures of technology providers in order to gain access to targets and steal sensitive data.


Over the course of about two years, Lapsus$ members infiltrated a number of high-profile targets, including Microsoft, Nvidia, and Okta, often using some combination of social …

access analysis capabilities enterprise enterprise networks extortion extortion group found hacking iam mfa networks operations order procedures tactics techniques technology weaknesses well-known

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Engineer, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

BaaN IV Techno-functional consultant-On-Balfour

@ Marlabs | Piscataway, US

Senior Security Analyst

@ BETSOL | Bengaluru, India

Security Operations Centre Operator

@ NEXTDC | West Footscray, Australia

Senior Network and Security Research Officer

@ University of Toronto | Toronto, ON, CA