Hacker News
- 3CX softphone compromised by state-level actor in supply chain attack https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/ 5 comments
- Dealing with Out-of-Memory Conditions in Rust https://www.crowdstrike.com/blog/dealing-with-out-of-memory-conditions-in-rust/ 96 comments
- Russian tracking of Ukrainian Field Artillery Units via Android Malware https://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/ 7 comments
Lobsters
- Bears in the Midst: Intrusion into the Democratic National Committee https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ 2 comments security
- Cybereason - opinions (I'm unimpressed) and EDR recommendations https://www.crowdstrike.com/blog/cve-2020-1472-zerologon-security-advisory/ 15 comments sysadmin
- PSA: uninstall 3CXDesktopApp client immediately https://www.crowdstrike.com/blog/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers/ 8 comments apple
- Linux-Targeted Malware Increases by 35% in 2021 https://www.crowdstrike.com/blog/linux-targeted-malware-increased-by-35-percent-in-2021/ 124 comments linux
- Ploutus ATM Malware Case Study: Automated Deobfuscation of a Strongly Obfuscated .NET Binary https://www.crowdstrike.com/blog/ploutus-atm-malware-deobfuscation-case-study/ 4 comments reverseengineering
- Development Cost of Porting TensorFlow Models to Pure Rust https://www.crowdstrike.com/blog/development-cost-of-porting-tensorflow-models-to-pure-rust/ 13 comments rust
- How to deal with out-of-memory conditions in Rust https://www.crowdstrike.com/blog/dealing-with-out-of-memory-conditions-in-rust/ 15 comments rust
- Interesting results comparing TF and Rust https://www.crowdstrike.com/blog/how-crowdstrike-combines-tensorflow-and-rust-for-performance/ 24 comments rust
- The Current State of Exploit Development: Addressing ACG, XFG, CET, and VBS/HVCI https://www.crowdstrike.com/blog/state-of-exploit-development-part-2/ 3 comments netsec
- Red Team Labs: Staying Off the Land https://www.crowdstrike.com/blog/staying-off-the-land-methodology/ 5 comments netsec
- Crowdstrike announces global partnership with Mercedes Amg Petronas Motorsport to protect the Formula One team in the paddock and beyond https://www.crowdstrike.com/resources/news/crowdstrike-announces-global-partnership-with-mercedes-amg-petronas-motorsport-to-protect-the-formula-one-team-in-the-paddock-and-beyond/ 10 comments formula1
- Using the Office 365 Activities API to Investigate Business Email Compromises https://www.crowdstrike.com/blog/hiding-in-plain-sight-using-the-office-365-activities-api-to-investigate-business-email-compromises/ 9 comments netsec
- Decrypting NotPetya/Petya - implementation mistake in seeking in Salsa20 keystream allows known plaintext attack https://www.crowdstrike.com/blog/decrypting-notpetya-tools-for-recovering-your-mft-after-an-attack/ 5 comments crypto
- Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units https://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/ 4 comments geopolitics
- Hacking analysis by CrowdStrike https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ 23 comments politics
- The Code That Hacked DNC https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ 46 comments programming
- Bears in the Midst: Intrusion into the Democratic National Committee https://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/ 3 comments netsec
- Great Heartbleed scanner: CROWDSTRIKE http://www.crowdstrike.com/community-tools/ 4 comments sysadmin
- Critical SSL/TLS vulnerability on iOS/OS X http://www.crowdstrike.com/blog/details-about-apple-ssl-vulnerability-and-ios-706-patch/index.html 4 comments technology