SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.

Malware Evasion Techniques Encyclopedia

New Malware Evasion Techniques Encyclopedia launched to Detect If Malware Is Running Under Virtualized Environment

CheckPoint has launched a new Malware Evasion Techniques Encyclopedia that contains techniques for detecting and analyzing threats executed in a virtualized environment. “These environments differ from usual host systems by a huge amount of artifacts: non-common files, registry keys, system objects, etc.” according to the Evasion Techniques Encyclopedia. There is a chance that malware could be detected…

Threat Hunting Images: Abusing Applint DLLs Registry: Detect This Behavior with Sigma Detection Rule

Abusing Applint DLLs Registry: Detect This Behavior with Sigma Detection Rule

Dynamic-link libraries (DLLs) that are specified in the AppInit_DLLs value in the Registry keys: HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Windows or HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows are loaded by user32.dll into every process that loads user32.dll With this sigma rule you can detect these behaviors: title: Abusing Applint DLLs Registry Path description: DLLs values in Applint registry values will be loaded by user32.dll…

Cisco vulnerabilities

Cisco Addresses High-Severity Vulnerabilities In Its Products

Cisco has issued security patches for vulnerabilities in its products, eight of which considered having a potentially high impact and the remainder rated medium. The vulnerabilities exist in Cisco products, including the Unified Computing System (UCS) software, Firepower firewall (FXOS), and the Nexus switch operating system (NX-OS) software.  “All six vulnerabilities have a Security Impact Rating (SIR)…