March 1, 2024, 1:25 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

I have added daemonlogger [1] for packet capture and Arkime [2] to visualize the packets captured by my DShield sensor and started noticing this activity that so far only gone to TCP/8090 which is URL and base64 encoded. The DShield sensor started capturing this activity on the 12 February 2024 inbound from various IPs from various locations.


Article Link: https://isc.sans.edu/diary/rss/30704


1 post - 1 participant


Read full topic

base64 capture confluence cve cve-2022-26134 dshield far february february 2024 packet packet capture packets scanning sensor tcp url

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Offensive Security Engineer

@ Ivanti | United States, Remote

Senior Security Engineer I

@ Samsara | Remote - US

Senior Principal Information System Security Engineer

@ Chameleon Consulting Group | Herndon, VA

Junior Detections Engineer

@ Kandji | San Francisco

Data Security Engineer/ Architect - Remote United States

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700