all InfoSec news
New SocGholish persistence method
Feb. 13, 2024, 11:29 p.m. | /u/reliaquest_official
For [Blue|Purple] Teams in Cyber Defence www.reddit.com
* SocGholish is using drive-by compromise in this new method to trick users into downloading a malicious JavaScript file. The file then downloads and extracts Python from a trusted domain and creates a scheduled task to run a malicious Python script.
* ReliaQuest believes this tactic will …
blueteamsec capabilities compromise defense domain downloads drive drive-by evasion file javascript malicious obfuscated organizations powershell powershell scripts python python script reliaquest run scheduled task script scripts socgholish tactic task
More from www.reddit.com / For [Blue|Purple] Teams in Cyber Defence
How to Block Residential Proxies using Okta
1 day, 7 hours ago |
www.reddit.com
2024 Cyber Insurance Claims Report
1 day, 21 hours ago |
www.reddit.com
Just-in-Time admin and production access using Azure PIM
2 days, 13 hours ago |
www.reddit.com
OSHIT: Seven Deadly Sins of Bad Open Source Research - bellingcat
2 days, 17 hours ago |
www.reddit.com
CVE-2024-21111 - Local Privilege Escalation in Oracle VirtualBox
4 days, 8 hours ago |
www.reddit.com
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Senior Security Architect - Northwest region (Remote)
@ GuidePoint Security LLC | Remote
Senior Consultant, Cyber Security Architecture
@ 6point6 | Manchester, United Kingdom
Junior Security Architect
@ IQ-EQ | Port Louis, Mauritius
Senior Detection & Response Engineer
@ Expel | Remote
Cyber Security Systems Engineer ISSE Splunk
@ SAP | Southbank (Melbourne), VIC, AU, 3006