Read More: Part 1 — Part 2 — Part 3 — Part 4 — @msuiche (Twitter)
This is by far, the most interesting release from Shadow Brokers as it does not only contain tools — but also materials describing the most complex and elaborate attack ever seen to date. A multi stages attack bypassing Cisco ASA Firewall…
Dubbed Fakesomware by Comae (Also called ExPetr, PetrWrap, NotPetya, DiskCoder).TL;DR: The ransomware was a lure for the media, this…
Read More: Part 1 — Part 2 — Part 3 — Part 4 @msuiche (Twitter)
Yes, this is bad — real bad — this is another ransom-ware leveraging SMB network kernel vulnerabilities to spread on the local network. The exploit used is based on…
Yet Another Worm eveNt (YAWN) is spawning a flurry of infosec marketing blog posts. There’s the technical analysis, the “how to block the last attack” posts, the “why are we still…
These were the top 10 stories published by Comae Technologies in 2017. You can also dive into monthly archives for 2017 by using the calendar at the top of this page.