Yearly Archives: 2021
How CEOs Evaluate Their Firms’ Preparedness for Ransomware Attacks
IEMLabs -
A new (ISC)2 survey offers cybersecurity professionals insights into the thinking of C-suite officials and their perceptions of their organizations' preparation for ransomware attacks....
UACME: Defeating Windows User Account Control using UACME
IEMLabs -
Using the built-in Windows AutoElevate, BackDoor feature to bypass Windows User Account Control.
System Requirements:-
x86-32/x64 Windows 7/8/8.1/10 (client, some methods, however, works on server version...
Apairoid: Analyze the security of both static and dynamic Android applications
IEMLabs -
Aparoid is a framework for analyzing Android applications. It provides a set of automated techniques for detecting vulnerabilities and other dangers in mobile apps....
New Magnat Cybercriminal Group Targets Victims via Fake Games and Apps
IEMLabs -
Magnat, a new threat actor, has been detected spreading various sorts of malware, including backdoors, malicious Chrome extensions, and data stealers. In these attacks,...
Emotet Needs No Intermediate Trojan, Drops Cobalt Strike Beacons Directly
IEMLabs -
What is Emotet?
Emotet is a Trojan horse that is disseminated mostly through spam emails (malspam). Malicious scripts, macro-enabled document files, and malicious links are...
Kit Hunter: — For Dedicated And Semi-Dedicated Hosting, a Basic Phishing Kit Scanner
IEMLabs -
By default, the script generates a report that lists the files that were identified as possibly problematic, lists the markers that identified them as...
Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes
IEMLabs -
DoppelPaymer targets both antivirus (AV) and endpoint detection and response (EDR) applications with Process Hacker, exploiting KProcessHacker. A blog post published in July 2019...
CYBERCOM and NSA chief: Cybersecurity is a team sport
IEMLabs -
Many of today's most serious cyber threats pose a threat to communal interests, necessitating continuing collaborative response.
Foreign states utilise cyber operations to steal information,...
PSScriptAnalyzer:— ScriptAnalyzer is available for download from the PowerShell Gallery.
IEMLabs -
PSScriptAnalyzer comes with a set of built-in rules that check for uninitialized variables, PS Credential Type usage, and Invoke-Expression usage, among other things. Additional...