Tag: domain names

  • Microsoft Security Blog: StilachiRAT analysis: From system reconnaissance to cryptocurrency theft

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/03/17/stilachirat-analysis-from-system-reconnaissance-to-cryptocurrency-theft/ Source: Microsoft Security Blog Title: StilachiRAT analysis: From system reconnaissance to cryptocurrency theft Feedly Summary: Microsoft Incident Response uncovered a novel remote access trojan (RAT) named StilachiRAT, which demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. This blog primarily focuses on analysis of the WWStartupCtrl64.dll…

  • Unit 42: The Next Level: Typo DGAs Used in Malicious Redirection Chains

    Source URL: https://unit42.paloaltonetworks.com/?p=138551 Source: Unit 42 Title: The Next Level: Typo DGAs Used in Malicious Redirection Chains Feedly Summary: A graph intelligence-based pipeline and WHOIS data are among the tools we used to identify this campaign, which introduced a variant of domain generation algorithms. The post The Next Level: Typo DGAs Used in Malicious Redirection…

  • Krebs on Security: Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’?

    Source URL: https://krebsonsecurity.com/2025/02/whos-behind-the-seized-forums-cracked-nulled/ Source: Krebs on Security Title: Who’s Behind the Seized Forums ‘Cracked’ & ‘Nulled’? Feedly Summary: The FBI joined authorities across Europe last week in seizing domain names for Cracked and Nulled, English-language cybercrime forums with millions of users that trafficked in stolen data, hacking tools and malware. An investigation into the history…

  • Hacker News: The secret life of DNS packets (2019)

    Source URL: https://stripe.com/blog/secret-life-of-dns Source: Hacker News Title: The secret life of DNS packets (2019) Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text outlines the importance of DNS (Domain Name System) infrastructure within network communications and describes a case study at Stripe, detailing how they monitored and troubleshot issues related to DNS…

  • Hacker News: How the British Airways’ breach kickstarted today’s web security challenge

    Source URL: https://baways.com/ Source: Hacker News Title: How the British Airways’ breach kickstarted today’s web security challenge Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the security risks associated with third-party scripts commonly used on websites. It highlights the potential vulnerabilities these scripts can introduce, especially when managed by external sources…

  • The Register: Why the long name? Okta discloses auth bypass bug affecting 52-character usernames

    Source URL: https://www.theregister.com/2024/11/04/why_the_long_name_okta/ Source: The Register Title: Why the long name? Okta discloses auth bypass bug affecting 52-character usernames Feedly Summary: Mondays are for checking months of logs, apparently, if MFA’s not enabled In potentially bad news for those with long names and/or employers with verbose domain names, Okta spotted a security hole that could…

  • Slashdot: Microsoft’s Honeypots Lure Phishers at Scale – to Spy on Them and Waste Their Time

    Source URL: https://it.slashdot.org/story/24/10/20/1840217/microsofts-honeypots-lure-phishers-at-scale—to-spy-on-them-and-waste-their-time?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Microsoft’s Honeypots Lure Phishers at Scale – to Spy on Them and Waste Their Time Feedly Summary: AI Summary and Description: Yes Summary: The text discusses an innovative approach by Microsoft to combat phishing using the Azure cloud platform, featuring the use of high-interaction honeypots to gather threat intelligence…

  • Krebs on Security: Local Networks Go Global When Domain Names Collide

    Source URL: https://krebsonsecurity.com/2024/08/local-networks-go-global-when-domain-names-collide/ Source: Krebs on Security Title: Local Networks Go Global When Domain Names Collide Feedly Summary: The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn’t exist at the time. Meaning, they…