China-linked hackers used patented spyware tech from front companies tied to Hafnium, exposing gaps in cyber threat attribution. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of…
Tag: SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.
Exploring FBot | Python-Based Malware Targeting Cloud and Payment Services
FBot arms threat actors with a multi-function attack tool designed to hijack cloud, Saas and web services. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware,…
LABScon Replay | Spectre Strikes Again: Introducing the Firmware Edition
Binarly’s CEO Alex Matrosov dives deep into the fascinating world of speculative attacks against System Management Mode (SMM) on AMD-based devices. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on…
LABSCon Replay | Intellexa and Cytrox: From Fixer-Upper to Intel Agency Grade Spyware
Vitor Ventura breaks down the processes one spyware organization takes to develop fully working spyware using a one-click zero-day exploit. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the…
Gaza Cybergang | Unified Front Targeting Hamas Opposition
Cluster of threat groups continues on trajectory to consolidate with shared victims, TTPs and evolving malware. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits,…
Sandman APT | China-Based Adversaries Embrace Lua
SentinelLabs, Microsoft, and PwC threat intelligence researchers provide attribution-relevant information on the Sandman APT cluster. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs,…
LABScon Replay | The Cyber Arm of China’s Soft Power: Reshaping a Continent
Tom Hegel explores China’s influence in Africa and highlights an opportunity for broader understanding of global cyber threat landscapes. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world…
Decoding the Past, Securing the Future | Enhancing Cyber Defense with Historical Threat Intelligence
Explore how revisiting past cyber incidents can empower defenders and help to anticipate future threats more effectively. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware,…
Decoding the Past, Securing the Future | Enhancing Cyber Defense with Historical Threat Intelligence
Explore how revisiting past cyber incidents can empower defenders and help to anticipate future threats more effectively. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware,…
Predator AI | ChatGPT-Powered Infostealer Takes Aim at Cloud Platforms
An emerging infostealer being sold on Telegram looks to harness generative AI to streamline cyber attacks on cloud services. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the world…