Tag: process injection
-
Cloud Blog: Mark Your Calendar: APT41 Innovative Tactics
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics/ Source: Cloud Blog Title: Mark Your Calendar: APT41 Innovative Tactics Feedly Summary: Written by: Patrick Whitsell Google Threat Intelligence Group’s (GTIG) mission is to protect Google’s billions of users and Google’s multitude of products and services. In late October 2024, GTIG discovered an exploited government website hosting malware being used to target…
-
Microsoft Security Blog: Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer
Source URL: https://www.microsoft.com/en-us/security/blog/2025/05/21/lumma-stealer-breaking-down-the-delivery-techniques-and-capabilities-of-a-prolific-infostealer/ Source: Microsoft Security Blog Title: Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer Feedly Summary: Over the past year, Microsoft Threat Intelligence observed the persistent growth and operational sophistication of Lumma Stealer, an info-stealing malware used by multiple financially motivated threat actors to target various industries. Microsoft,…
-
Cloud Blog: Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers/ Source: Cloud Blog Title: Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers Feedly Summary: Written by: Lukasz Lamparski, Punsaen Boonyakarn, Shawn Chew, Frank Tse, Jakub Jozwiak, Mathew Potaczek, Logeswaran Nadarajan, Nick Harbour, Mustafa Nasser Introduction In mid 2024, Mandiant discovered threat actors deployed custom backdoors on Juniper Networks’ Junos…
-
Hacker News: How is my Browser blocking RWX execution?
Source URL: https://rwxstoned.github.io/2025-01-04-Reviewing-browser-hooks/ Source: Hacker News Title: How is my Browser blocking RWX execution? Feedly Summary: Comments AI Summary and Description: Yes Summary: The text describes a novel security feature implemented in a popular browser that functions similarly to an Endpoint Detection and Response (EDR) system. By monitoring thread creation at runtime, the browser can…