techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#EDR

1 post1 participant0 posts today
ECS Infotech Pvt. Ltd.<p>🔐 Stay ahead of cyber threats with Endpoint Detection and Response (EDR)!</p><p>Discover how EDR solutions protect your business, detect threats in real time, and respond fast to security incidents.</p><p>Read the full guide 👉 <a href="https://bit.ly/4lIODtR" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4lIODtR</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://mastodon.social/tags/EndpointSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EndpointSecurity</span></a> <a href="https://mastodon.social/tags/TechSolutions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechSolutions</span></a> <a href="https://mastodon.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://mastodon.social/tags/BusinessSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BusinessSecurity</span></a> <a href="https://mastodon.social/tags/CyberProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberProtection</span></a> <a href="https://mastodon.social/tags/ECS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECS</span></a> <a href="https://mastodon.social/tags/ECSInfotech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECSInfotech</span></a></p>
Pyrzout :vm:<p>Five fundamentals for a cyber-resilient future – Source: news.sophos.com <a href="https://ciso2ciso.com/five-fundamentals-for-a-cyber-resilient-future-source-news-sophos-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/five-fundamental</span><span class="invisible">s-for-a-cyber-resilient-future-source-news-sophos-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/Products" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Products</span></a>&amp;Services <a href="https://social.skynetcloud.site/tags/nakedsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakedsecurity</span></a> <a href="https://social.skynetcloud.site/tags/nakedsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakedsecurity</span></a> <a href="https://social.skynetcloud.site/tags/endpoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpoint</span></a> <a href="https://social.skynetcloud.site/tags/Endpoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Endpoint</span></a> <a href="https://social.skynetcloud.site/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://social.skynetcloud.site/tags/mdr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mdr</span></a> <a href="https://social.skynetcloud.site/tags/XDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XDR</span></a> <a href="https://social.skynetcloud.site/tags/MDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MDR</span></a></p>
Solidarity IT<p>Threats may evolve, but you'll stay safe! 🛡️</p><p>The bad news about cybersecurity? As you add more apps, devices, and connections, the risk of cyberattacks increases. The good news? There's a better way to protect your network: managed Endpoint Detection and Response (EDR).</p><p>Protect your business, employees, and customers with our managed EDR solution. Stay secure and sleep easy! 😴🔒<br><a href="https://www.solidarityit.com/2025/02/11/threats-may-evolve-but-youll-stay-safe/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">solidarityit.com/2025/02/11/th</span><span class="invisible">reats-may-evolve-but-youll-stay-safe/</span></a></p><p><a href="https://mastodon.social/tags/SolidarityIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SolidarityIT</span></a> <a href="https://mastodon.social/tags/FriendlyFussFreeIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FriendlyFussFreeIT</span></a> <a href="https://mastodon.social/tags/ProtectIT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProtectIT</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://mastodon.social/tags/RansomwareProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomwareProtection</span></a></p>
OTX Bot<p>DeedRAT Backdoor Enhanced with Advanced Capabilities</p><p>Chinese threat actors have launched a new phishing campaign using DeedRAT, a modular backdoor. The campaign exploits a DLL side-loading vulnerability in VIPRE Antivirus Premium's MambaSafeModeUI.exe. DeedRAT now includes a new NetAgent module, expanding its capabilities. The malware uses TCP for C2 communication and employs various persistence techniques. Notable features include a custom encryption algorithm using a linear congruential generator, API protection, and junk functions to confuse analysts. The backdoor's continued development and increased obfuscation suggest the threat actors are actively enhancing their tools and techniques.</p><p>Pulse ID: 687e17c60ec35a8df8a7ad9d<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/687e17c60ec35a8df8a7ad9d" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/687e1</span><span class="invisible">7c60ec35a8df8a7ad9d</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-07-21 10:34:46</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/BackDoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BackDoor</span></a> <a href="https://social.raytec.co/tags/Chinese" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chinese</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/DRat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DRat</span></a> <a href="https://social.raytec.co/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://social.raytec.co/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/TCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCP</span></a> <a href="https://social.raytec.co/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
Taylor Parizo<p>This has to be one of my favorite EDR resources after Evading EDR by Matt Hand.<br><a href="https://blog.deeb.ch/posts/how-edr-works/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.deeb.ch/posts/how-edr-wor</span><span class="invisible">ks/</span></a><br><a href="https://infosec.exchange/tags/edr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>edr</span></a> <a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a></p>
OTX Bot<p>From a Teams Call to a Ransomware Threat: Matanbuchus 3.0 MaaS Levels Up</p><p>Matanbuchus 3.0, a malware loader available as Malware-as-a-Service, has evolved with significant updates. It now employs sophisticated techniques including improved communication protocols, in-memory stealth capabilities, enhanced obfuscation, and support for WQL queries, CMD, and PowerShell reverse shells. The loader collects detailed system data, including information on EDR security controls, to tailor subsequent attacks. It can execute various commands through regsvr32, rundll32, msiexec, or process hollowing. The malware establishes persistence through scheduled tasks and registry modifications. Recent campaigns have targeted victims through external Microsoft Teams calls impersonating IT helpdesks, leading to potential ransomware compromises.</p><p>Pulse ID: 687a0d5dc93942c183eddbf5<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/687a0d5dc93942c183eddbf5" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/687a0</span><span class="invisible">d5dc93942c183eddbf5</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-07-18 09:01:17</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/MaaS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MaaS</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/MalwareAsAService" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAsAService</span></a> <a href="https://social.raytec.co/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.raytec.co/tags/MicrosoftTeams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftTeams</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://social.raytec.co/tags/RansomWare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomWare</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
PolySécure NLF<p>🎙️ Nouveau podcast avec Camille Felx-Leduc et Steve Bélanger sur les défis des signaux xDR en environnement industriel (<a href="https://social.polysecure.ca/tags/OT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OT</span></a>).</p><p>Éléments clés: <br>• Impossible d'installer un <a href="https://social.polysecure.ca/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> sur un automate vs poste Windows<br>• Équipements industriels : 40 ans de durée de vie (certains tournent encore sur Windows 3.11!)<br>• Théorie du 99% : mieux vaut protéger les actifs Windows/Linux</p><p>🎧 Web: <a href="https://polysecure.ca/posts/episode-0x610.html#78a78c25" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">polysecure.ca/posts/episode-0x</span><span class="invisible">610.html#78a78c25</span></a><br>🎧 Spotify: <a href="https://open.spotify.com/episode/3FJuJ2FS3o0N1pf2crDXsP?si=o0bcGgZ7Q7iibzdPLDflpA" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">open.spotify.com/episode/3FJuJ</span><span class="invisible">2FS3o0N1pf2crDXsP?si=o0bcGgZ7Q7iibzdPLDflpA</span></a><br>🎧 YouTube: <a href="https://youtu.be/9SXhlFGZEZQ" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/9SXhlFGZEZQ</span><span class="invisible"></span></a> </p><p><a href="https://social.polysecure.ca/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersécurité</span></a> <a href="https://social.polysecure.ca/tags/XDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XDR</span></a></p>
k3ym𖺀<p><strong>The mice are getting smarter. But so are the cats.</strong></p><p>Malware’s evolving—sandbox-aware, VM-aware, and playing dead like it's auditioning for a nature documentary. But <span class="h-card" translate="no"><a href="https://infosec.exchange/@FortiGuardLabs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>FortiGuardLabs</span></a></span> is bringing the claws with real-time behavioral detection that doesn’t rely on hopes and dreams.</p><p>This isn’t your grandma’s AV anymore.</p><p><strong>Key takeaways:</strong></p><ul><li>Modern malware avoids detection by acting normal until you blink</li><li>Static detection is getting smoked by polymorphic code and evasive loaders</li><li>FortiEDR &amp; FortiDeceptor are leveraging runtime behavior, memory inspection, and deception to outsmart stealthy threats</li><li>Cats &gt; mice, especially when they know your playbook</li></ul><p>🔗 Full breakdown:<br><a href="https://www.fortinet.com/blog/threat-research/catching-smarter-mice-with-even-smarter-cats" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortinet.com/blog/threat-resea</span><span class="invisible">rch/catching-smarter-mice-with-even-smarter-cats</span></a></p><p><strong>TL;DR for blue teamers:</strong></p><ul><li>Stop chasing IOCs and start profiling behavior.</li><li>Watch process spawning patterns and parent/child anomalies.</li><li>Deception tech isn’t just a gimmick—it’s how you catch the stuff that thinks it’s invisible.</li><li>If your EDR doesn’t trigger on a payload sleeping for 5 minutes, you’re already five minutes too late.</li></ul><blockquote><p>“It’s clean, I ran it through the sandbox.”<br>— The last words of a junior analyst before the domain controller started speaking Russian</p></blockquote><p><a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/MalwareEvasion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareEvasion</span></a> <a href="https://infosec.exchange/tags/BehavioralDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BehavioralDetection</span></a> <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/DeceptionTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeceptionTech</span></a> <a href="https://infosec.exchange/tags/SandboxEvasion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SandboxEvasion</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
Cycling Europe<p><a href="https://www.cyclingeu.com/662268/full-race-highlights-2025-uci-xcc-dhi-xco-world-cup-round-6-pal-arinsal-andorra-%f0%9f%87%a6%f0%9f%87%a9/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyclingeu.com/662268/full-race</span><span class="invisible">-highlights-2025-uci-xcc-dhi-xco-world-cup-round-6-pal-arinsal-andorra-%f0%9f%87%a6%f0%9f%87%a9/</span></a> FULL RACE HIGHLIGHTS | 2025 UCI XCC, DHI &amp; XCO World Cup – Round 6 Pal Arinsal – Andorra 🇦🇩 #<a href="https://pubeurope.com/tags/xcm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xcm</span></a> <a href="https://pubeurope.com/tags/Andorra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Andorra</span></a> <a href="https://pubeurope.com/tags/Bicycling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bicycling</span></a> <a href="https://pubeurope.com/tags/Biking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Biking</span></a> <a href="https://pubeurope.com/tags/CrossCountry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossCountry</span></a> <a href="https://pubeurope.com/tags/CrossCountryMarathon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossCountryMarathon</span></a> <a href="https://pubeurope.com/tags/CrossCountryMountainBiking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrossCountryMountainBiking</span></a> <a href="https://pubeurope.com/tags/Cycling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cycling</span></a> <a href="https://pubeurope.com/tags/CyclingAndorra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyclingAndorra</span></a> <a href="https://pubeurope.com/tags/DHI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DHI</span></a> <a href="https://pubeurope.com/tags/downhill" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>downhill</span></a> <a href="https://pubeurope.com/tags/DownhillMountainBiking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DownhillMountainBiking</span></a> <a href="https://pubeurope.com/tags/EBikes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EBikes</span></a> <a href="https://pubeurope.com/tags/EBiking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EBiking</span></a> <a href="https://pubeurope.com/tags/EEDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EEDR</span></a> <a href="https://pubeurope.com/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://pubeurope.com/tags/enduro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enduro</span></a> <a href="https://pubeurope.com/tags/EnduroWorldSeries" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnduroWorldSeries</span></a> <a href="https://pubeurope.com/tags/MountainBiking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MountainBiking</span></a> <a href="https://pubeurope.com/tags/MTB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MTB</span></a> <a href="https://pubeurope.com/tags/MTBRacing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MTBRacing</span></a> <a href="https://pubeurope.com/tags/racing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>racing</span></a> <a href="https://pubeurope.com/tags/UCI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UCI</span></a> <a href="https://pubeurope.com/tags/UCIMTBWorldSeries" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UCIMTBWorldSeries</span></a> <a href="https://pubeurope.com/tags/UciWorldCup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UciWorldCup</span></a> <a href="https://pubeurope.com/tags/WorldCup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WorldCup</span></a> <a href="https://pubeurope.com/tags/WorldSeries" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WorldSeries</span></a> <a href="https://pubeurope.com/tags/XCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XCC</span></a> <a href="https://pubeurope.com/tags/XCO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XCO</span></a></p>
Paxion Cybersecurity<p>💼 Louis Vuitton Just Got Hacked. Again.</p><p>High-end doesn’t mean high security — and this breach proves it.</p><p>🧠 <a href="https://mastodon.social/tags/Monday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Monday</span></a> Tip:<br>If your login system still allows weak passwords or reused credentials, fix it today.<br><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.social/tags/LuxuryRetail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LuxuryRetail</span></a> <a href="https://mastodon.social/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://mastodon.social/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://mastodon.social/tags/LouisVuitton" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LouisVuitton</span></a></p>

Threat Actors Exploits EDR Framework to Deploy Malware

A commercial anti-virus and endpoint detection and response evasion framework
called “SHELLTER” is exploited in the wild to deploy sophisticated malware.
This framework is originally designed to carry out penetration testing

Pulse ID: 68692d0e2fcde262e0494d4b
Pulse Link: otx.alienvault.com/pulse/68692
Pulse Author: cryptocti
Created: 2025-07-05 13:47:58

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Analysis of the threat case of kimsuky group using 'ClickFix' tactic

The Kimsuky group has adopted a deceptive tactic called 'ClickFix' to trick users into unknowingly participating in attack chains. This method involves disguising malicious instructions as troubleshooting guides or security document verification procedures. The campaign is believed to be an extension of Kimsuky's ongoing 'BabyShark' threat activity. The tactic has evolved from VBS-based attacks to more sophisticated email-based and website-delivered methods. Attackers impersonate legitimate entities and use multilingual manuals to guide victims through seemingly harmless steps that actually execute malicious code. The group's infrastructure and linguistic patterns point to North Korean origin. To counter such threats, EDR-based defense strategies are crucial for detecting obfuscated malware and identifying abnormal behaviors.

Pulse ID: 6864dc6fbb7b39eefb96ee85
Pulse Link: otx.alienvault.com/pulse/6864d
Pulse Author: AlienVault
Created: 2025-07-02 07:14:55

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

What is the best EDR for a limited budget?

I manage a company with about 110 endpoints, we would like to consider taking a leap and improving our security by considering the purchase of an EDR.

We currently use a simple antivirus, Kaspersky Internet Security with patch management