Beetles Blog

Beetles Blog

Thoughts, stories and ideas.

  • Home
Scroll Down
← Newer Posts Page 3 of 4 Older Posts →

Operation Brightroar: Uncovering more attack pattern

After publishing our previous blog we got lots of similar attack sample from various sources. We found the attacker to be using various social engineering techniques. »

APT Hunters APT Hunters 01 June 2017

Operation Brightroar: Cybercriminals are spreading malware in large APT attack in Bangladesh

A couple of days ago, we noticed that a few somewhat suspicious text messages, claiming to give the user "free internet" and other things, was being »

APT Hunters APT Hunters on apt, threat hunting, malware, rat 29 May 2017

Conneczo: Looking Through Your Eyes!

Conneczo is a web-based video calling and instant messaging application. It allows users to connect to other people without requiring to register on the site. After »

Tarek Siddiki Tarek Siddiki 29 May 2017

Intelligence-Driven incident response and hunting - enhances the speed and effectiveness of cyber threat detection.

Nowadays most organization have an OPSEC team, they strive to place an effective defense to detect and mitigate custom-crafted attacks and infiltration. Traditional threat detection tools »

nahidul kibria nahidul kibria 01 April 2017

DLL Hijacking : Breaking the Bad

DLL hijacking is a decade-old vulnerability, and in mid-2010 it was all the rage when thousands of applications found vulnerable and even later some big names »

Kaisar Reagan Kaisar Reagan on research, dll-hijack, Application Security 18 February 2017
← Newer Posts Page 3 of 4 Older Posts →
Beetles Blog © 2023