Avatar
CrowdCyber
36f403b6512d7e69bb7b89442ce43ffa63cdf6ead2641d7935b239e2ec3557ad
Revolutionizing and Democratizing Cybersecurity

Cybersecurity researchers spotted a new malware-as-a-service (MaaS) called BunnyLoader that’s appeared in the threat landscape. https://securityaffairs.com/151869/malware/bunnyloader-maas.html?amp=1

SandBlaster: Reversing the Apple sandbox from Cellubrite Labs https://github.com/cellebrite-labs/sandblaster

How Microsoft Had Signing Key Compromised - Results of Major Technical Investigations for Storm-0558 Key Acquisition https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/

EchoDrv: Tool permitting to abuse Kernel read/write vulnerability in ECHOAC anti-cheat driver echo_driver.sys https://github.com/YOLOP0wn/EchoDrv

Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/

“MrTonyScam” — Botnet of Facebook Users Launch High-Intent Messenger Phishing Attack on Business Accounts https://labs.guard.io/mrtonyscam-botnet-of-facebook-users-launch-high-intent-messenger-phishing-attack-on-business-3182cfb12f4d

Fully Integrated Adversarial Operations Toolkit (C2, stagers, agents, ephemeral infrastructure, phishing engine, and automation) https://github.com/malcomvetter/Periscope

Cheat sheet that contains common enumeration and attack methods for Windows Active Directory. https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet

Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/