Want to see real obfuscated malware run safely from NPM while revealing what it does? Take part in the lecture by Zbigniew Tenerowicz - learn how it's possible and how to use the technology behind it to defend from malicious code, which gets past your audits and detections. 👾 Plus: demo of malware research that delivers payloads as precompiled V8 bytecode instead of obfuscated JavaScript. Come and “Watch me run malware from NPM”! Join us at: https://lnkd.in/dN6yGSP 🎫 #CONFidenceConf #Cybersecurity #Conference #Program #Malware #Defence #WebSecurity #JavaScript
CONFidence Conference’s Post
More Relevant Posts
-
🔒 Discover the fascinating world of cybersecurity through this captivating case study on JavaScript malware exhibiting worm-like behavior! Uncover how this threat functions and learn valuable strategies to safeguard your systems. Stay informed, stay protected. 💻🛡️ #Cybersecurity #Malware #CaseStudy #JavaScript #WormBehavior #StaySecure Check it out now: https://lnkd.in/dQ4XKRry
To view or add a comment, sign in
-
-
Fake WinRAR PoC on GitHub Spreads VenomRAT Malware A threat actor recently attempted to distribute VenomRAT malware by uploading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub. Full post: https://lnkd.in/dQ6MnuR9 #winrar #poc #github #venomrat #malware #vulnerability #hacking #informationsecurity #infosec
To view or add a comment, sign in
-
Day 9 Malware Handling 101 has been completed for Advent Of Cyber 2023! on TryHackMe. I have decompiled malware using dnSpy which the malware was written in C#. I have used my programming concepts and understanding of C# to analyse what exactly the malware does, for instance, how the malware decrypts and encrypts data and finds the key in the code. Furthermore, finding what domains it connects to. #tryhackme #blueteam #malwareanalysis #cybersecurity
To view or add a comment, sign in
-
-
Teaching online Cyber security courses on udemy like Kernel Exploitation, Exploit Development,Malware Analysis, Reverse Engineering
[HUGE DISCOUNT%] - on my brand new Course 64-BIT ASSEMBLY & SHELLCODING FOR HACKERS & PENTESTERS Join this course with 67% discount. Coupon code : L33T-HACK3R60 Link : https://lnkd.in/g5DGy__W #ethicalhacking hashtag #cybersecurity #penetrationtesting #assemblyprogramming #malwareanalysis #udemycourses
To view or add a comment, sign in
-
-
Teaching online Cyber security courses on udemy like Kernel Exploitation, Exploit Development,Malware Analysis, Reverse Engineering
[HUGE DISCOUNT%] - on my brand new Course 64-BIT ASSEMBLY & SHELLCODING FOR HACKERS & PENTESTERS Join this course with 67% discount. Coupon code : PROMOT-64BIT course link: https://lnkd.in/g-sseMbp #ethicalhacking#cybersecurity #penetrationtesting #assemblyprogramming #malwareanalysis #udemycourses
To view or add a comment, sign in
-
-
New room Advanced Static Analysis from TryHackMe: Learn how to identify code constructs and examine the assembly code of malware. Was bit tricky this room, also spending time analyzing the wrong file, but over all this is very insetting room, you will learn a lot. 🐛 Introduction 🐝 Malware Analysis: Overview 🪲 Connecting to the VM 🐞 Ghidra: A Quick Overview 🦋 Identifying C Code Constructs in Assembly 🐙 An Overview of Windows API Calls 🪱 Common APIs used by Malware 🦠 Process Hollowing: Overview 🐠 Analyzing Process Hollowing https://lnkd.in/dAsenrnY #tryhackme #malwareanalysis #assembly #assemblycode #malware #staticanalysis #cybersecurity
To view or add a comment, sign in
-
-
Co-founder | Entrepreneur | Chief Hacking Officer | Certified Professional Penetration Tester (eCPPT) | Web Application Penetration Tester (eWPT) | Ethical Hacker | Cloud Security Specialist | Shift Left Security
I recently conducted a security training session where the topic of drive-by-downloads surfaced. During the session, participants inquired about the current relevance of this issue. Insights from a closed-user group webinar revealed a concerning trend: many malware loaders are distributed through fake Chrome updates enabled by SEO poisoning. These malware loaders, often in JavaScript, are designed to trigger command line shells to download actual malware! EDR/XDR/MDR are the best combination to block and detect such attacks.
To view or add a comment, sign in
-
Teaching online Cyber security courses on udemy like Kernel Exploitation, Exploit Development,Malware Analysis, Reverse Engineering
[HUGE DISCOUNT%] - on my brand new Course 64-BIT ASSEMBLY & SHELLCODING FOR HACKERS & PENTESTERS Join this course with 67% discount. Coupon code : L33T-HACK3R60 Link : https://lnkd.in/g5DGy__W #ethicalhacking #cybersecurity #penetrationtesting #assemblyprogramming #malwareanalysis #udemycourses
To view or add a comment, sign in
-
-
GitHub Malware: 100,000+ Projects at Risk 😵💫 Ever downloaded code from GitHub to save time or get inspiration for your project? A recent discovery shows over 100,000 repositories might be infected with malware. Read more about it: https://lnkd.in/dvPuymFH These attackers are sneaky! They use tactics like creating confusingly similar names to popular projects or directly uploading malware. One wrong download could compromise you system! ❌ Here's how to stay safe: 1) Download code from developers you know and trust. 2) Take time to understand what the code does before using it, especially from new sources. 3) Enlist a code scanner! These tools can help identify hidden malware lurking in the code. Let's keep the community safe! Share and spread awareness about security practices on GitHub. #cyberdefense #cyberawareness #digitalindia #security #github
To view or add a comment, sign in
-
-
Teaching online Cyber security courses on udemy like Kernel Exploitation, Exploit Development,Malware Analysis, Reverse Engineering
[HUGE DISCOUNT%] - on my brand new Course 64-BIT ASSEMBLY & SHELLCODING FOR HACKERS & PENTESTERS Join this course with 67% discount. Coupon code : L33T-HACK3R60 Link : https://lnkd.in/g5DGy__W #ethicalhacking #cybersecurity #penetrationtesting #assemblyprogramming #malwareanalysis #udemycourses
To view or add a comment, sign in
-