‘Cause baby, now we’ve got bad blood You know it used to be mad love So take a look what you’ve done ’Cause baby, now we’ve got bad blood, hey! Now we’ve got problems And I don’t think we can solve ’em You made a really deep cut And baby, now we’ve got bad blood, …
Author Archives: Menard
On Cryptocurrency Mining Malware and Electroneum
Down to my last match fire I touch just to feel Why is it easier to burn than it is to heal? The Chainsmokers, XYLO, Setting Fires Note: this article was created 1st week of March 2018 when there was no notable malware family messing with Electroneum (ETN)….yet While investigating some suspicious activities from one …
Continue reading “On Cryptocurrency Mining Malware and Electroneum”
On Cryptocurrency Mining Malware
We don’t deal with outsiders very well They say newcomers have a certain smell You have trust issues, not to mention They say they can smell your intentions You’re lovin’ on the freakshow sitting next to you You’ll have some weird people sitting next to you You’ll think “How did I get here, sitting next …
Repost: Cluster of Coins: How Machine Learning Detects Cryptocurrency-mining Malware
Note: In my previous post, I promised more #tech #infosec #security insights on #Cryptocurrency #Bitcoin #Monero so let me do this repost of my recent collab post. Personal insights to follow soon 🙂 Cluster of Coins: How Machine Learning Detects Cryptocurrency-mining Malware By Jon Oliver and Menard Osena As new trends and developments in the …
Repost: Cryptocurrency-Mining Malware: 2018’s New Menace?
Cryptocurrency-Mining Malware: 2018’s New Menace? by: Menard Osena Will cryptocurrency-mining malware be the new ransomware? The popularity and increasing real-world significance of cryptocurrencies are also drawing cybercriminal attention — so much so that it appears to keep pace with ransomware’s infamy in the threat landscape. In fact, cryptocurrency mining was the most detected network event …
Continue reading “Repost: Cryptocurrency-Mining Malware: 2018’s New Menace?”
On Salon.com and Cryptocurrency Mining
“When able to attack, we must seem unable; when using our forces, we must seem inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near” Sun Tzu, Art of War I came across this article last week: https://www.salon.com/about/faq-what-happens-when-i-choose-to-suppress-ads-on-salon/ <image …
On Capture the Flag
Do you have l33t skills on targeted attacks, Internet of Things (IoT) and Industrial Control Systems (ICS/SCADA) and cybercrime? Interested in having some extra cash (JPY 1,000,000 (approximately US $8,700) or want to have have some fun while learning and building more knowledge in the InfoSec industry? If yes, then read on… Trend Micro is …
On SHA1
I posted google’s announcement on the SHA1 Shattering in twitter several weeks ago Bye #SHA1 https://t.co/W3X5RMQhGO https://t.co/BZ4qvT1TZG pic.twitter.com/PlDFrTCCzY — Menard Osena (@Menardconnect) February 24, 2017 And I was surprised that a fellow infosec dude replied and tweeted @Menardconnect a security platform still used MD5. shhhh… — daves espia (@daves_espia) February 24, 2017 and it seems …
On Ransomware
“They can beg and they can plead But they can’t see the light Coz the boy with the cold hard cash Is always Mr. Right” Material Girl, Madonna I was planning to write about Ransomware for a long long time but I don’t know where to start. Will I start with the email that my …
On Pump and Dump Spam Run
I thought they were an extinct in the wild technological mal-species already. But just yesterday I got this spammy mail via my mailbox: Image 1. Suspicious Email Sorry I choose not comment on the company as I do not have verifiable info on them nr their industry. But I did not subscribe the affected mailbox …