Remove tag cyber-attack
article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

What is interesting (at least in my personal point of view) is the way the attacker (ab)used the JS-JVM integration. Today I’d like to share the following reverse engineering path since it ended up to be more complex respect what I thought. Stage1: JAR invoking JavaScript. This is totally interesting stuff :D.

article thumbnail

APT34: Glimpse project

Security Affairs

On April 19 2019 researchers at Chronicle, a security company owned by Google’s parent company, Alphabet, have examined the leaked tools , exfiltrated the past week on a Telegram channel, and confirmed that they are indeed the same ones used by the OilRig attackers. But let’s move on and start a quick analysis on it. The Glimpse Project.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

It’s time to evolve beyond the UNIX operating system. OSes today are basically ineffective database managers, so why not build an OS that’s a database manager? Michael Coden, Associate Director, Cybersecurity, MIT Sloan, along with Michael Stonebreaker will present this novel concept at RSAC 2023. He died prematurely on April 23 in 2021.