//=time() ?>
PhishingJS: A Deep Learning Model for JavaScript-Based Phishing Detection https://t.co/eBgGbkxtdg #Phishing #Tools
Remote access tool or trojan? How to detect misbehaving RATs https://t.co/fDPsL2jGl3 #Malware #Resources #ThreatHunting
Discovering CAPTCHA Protected Phishing Campaigns https://t.co/0LvUUjFfTY #News #Resources
Nimplant – A Cross-Platform Implant Written In Nim https://t.co/0mRFWIDff8 #Offense #Tools
Security Scorecards - Security Health Metrics For Open Source https://t.co/fySVSmWQrb #CodeAnalysis #CodeReview #Fuzzing #Linux
Evade Sandboxes With a Single Bit – the Trap Flag https://t.co/DpbCD8zpgf #ApplicationAdvisoryAnalysis #Malware #Unit42
Red-Shadow - Lightspin AWS IAM Vulnerability Scanner https://t.co/o9xlbWorbF #AWS #AWSIAM #Escalation #JSON
Klingon RAT a technical analysis of an advanced RAT written in Go. The RAT is well-featured and resilient due to its multiple methods of persistence and privilege escalation. It was determined that the RAT is being used… https://t.co/Q7LB1pqs8g #security #threathunting #infosec
Matanbuchus: Malware-as-a-Service with Demonic Intentions https://t.co/YnCZ5UM4Yr #Unit42 #BelialDemon #malware
DarkSide Pipeline Attack Shakes Up the Ransomware-as-a-Service Landscape https://t.co/XntcsU59Wz #security #threathunting #infosec