logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • CISA, NSA Issue New IAM Best Practice Guidelines
  • New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
  • Zyxel Issues Critical Security Patches for Firewall and VPN Products
  • Microsoft 365 phishing attacks use encrypted RPMSG messages
  • Using DFIR Techniques To Recover From Infrastructure Outages

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-33799 (netbox) 24 May 2023
  • CVE-2023-33800 (netbox) 24 May 2023
  • CVE-2023-33798 (netbox) 24 May 2023
  • CVE-2023-33786 (netbox) 24 May 2023
  • CVE-2023-33793 (netbox) 24 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Uncovering APT29 tool: Trojan PolyGlot Duke — (unpacking)

Posted on 23 February 2021

From malware.news

In this blog, i will be unpacking , static and dynamic analysis of trojan “PolyGlot Duke” from APT29. For this blog we only focus on Unpacking.

Read more…

Posted in News

Post navigation

Previous post: BBC: More than 100 devices stolen – Concern about data leakage
Next post: Why Was SolarWinds So Vulnerable to a Hack?
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.