Search results: Cobalt Strike

Leverage Open Source Threat Intelligence Against Cobalt Strike Attacks

How to Leverage Open Source Threat Intel Against Cobalt Strike Attacks

| | platform
The post How to Leverage Open Source Threat Intel Against Cobalt Strike Attacks appeared first on Low-Code Security Automation & SOAR Platform | Swimlane ...
Detecting maliciously used Cobalt Strike infrastructure

Detecting maliciously used Cobalt Strike infrastructure

A few months ago, Google Cloud shared that it has identified 34 cracked versions of Cobalt Strike and released YARA Rules to detect specific versions of Cobalt Strike more likely to be ...
The Week in Cybersecurity: Meet Manjusaka, 'the Chinese sibling of Silver and Cobalt Strike'

The Week in Cybersecurity: Meet Manjusaka, ‘the Chinese sibling of Silver and Cobalt Strike’

Welcome to the latest edition of The Week in Cybersecurity, which brings you the newest headlines from both the world and our team about the most pressing topics in cybersecurity. This week: ...

New ‘pymafka’ malicious package drops Cobalt Strike on macOS, Windows, Linux

This week, Sonatype's automated malware detection bots have discovered malicious Python package 'pymafka' in the PyPI registry ...

Tracking Cobalt Strike Servers Used in Cyberattacks on Ukraine

| | Threat Research
On April 18, 2022, CERT-UA published alert #4490, which describes a malicious email campaign targeting Ukraine. The email attempts to deploy a Cobalt Strike beacon on the victim's system through the use ...
™

WEBINAR: Owning the Offensive Layer of Cyber Security: Understanding How Frontline Integrates into Core Impact and Cobalt Strike

The post WEBINAR: Owning the Offensive Layer of Cyber Security: Understanding How Frontline Integrates into Core Impact and Cobalt Strike appeared first on Digital Defense ...

Squirrelwaffle: New Loader Delivering Cobalt Strike

|
Zscaler ThreatLabz has been following an emerging new malware loader known as Squirrelwaffle that is being used to deliver Cobalt Strike. In this blog, we will be analyzing the complete attack chain ...

Cobalt Strike Vulnerability Affects Botnet Servers

Cobalt Strike is a security tool, used by penetration testers to simulate network attackers. But it’s also used by attackers — from criminals to governments — to automate their own attacks. Researchers ...
Services tab in CapLoader

Detecting Cobalt Strike and Hancitor traffic in PCAP

This video shows how Cobalt Strike and Hancitor C2 traffic can be detected using CapLoader. Your browser does not support the video tag. I bet you're going: 😱 OMG he's analyzing Windows ...