#LAZARUS

DaLetra Españoldaletraesp
2025-12-01

Ver la letra de la canción “Lazarus” de David Bowie

daletra.net/david-bowie/letras

WhisprNewsWhisprNews
2025-11-30
DaLetradaletraita
2025-11-29

Scopri il testo della canzone “Lazarus” di David Bowie

daletra.online/david-bowie/tes

2025-11-28

Analysis of APT-C-26 (Lazarus) Group's Attack Campaign Using Remote IT Disguise to Deploy Monitoring Software

Pulse ID: 692930f0634c859da3574eb7
Pulse Link: otx.alienvault.com/pulse/69293
Pulse Author: Tr1sa111
Created: 2025-11-28 05:19:44

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Lazarus #OTX #OpenThreatExchange #bot #Tr1sa111

CyberNetsecIOnetsecio
2025-11-26

📰 Geopolitical Shift: Russian and North Korean State Hackers Found Sharing Attack Infrastructure

‼️ Unprecedented cyber alliance: Russian APT Gamaredon & North Korea's Lazarus Group caught sharing C2 attack infrastructure. The collaboration signals a dangerous escalation in state-sponsored threats. ...

🔗 cyber.netsecops.io/articles/un

The Ukrainian Tribuneuatribune
2025-11-23

Two of the world’s most prolific state-linked groups — ’s and ’s collective — have been spotted sharing resources.

Experts found overlapping and shared between the two groups.

politico.eu/article/russia-nor

2025-11-21

Analysis of APT-C-26 (Lazarus) Group's Attack Campaign Using Remote IT Disguise to Deploy Monitoring Software

The report details an attack campaign by APT-C-26 (Lazarus), a highly active APT group targeting various industries globally. The group deployed a customized monitoring program with remote desktop control capabilities, likely used by remote IT personnel infiltrating target companies. The malware consists of a registration program, a daemon process, and a DLL file for core monitoring functions. It utilizes Windows Shell extension for persistence and creates a covert remote desktop environment. The analysis reveals sophisticated techniques for evading detection, including disabling Windows Defender and manipulating firewall rules. The monitoring software captures screen data, uploads it to a server, and provides remote desktop functionality. Based on the analysis and tactics used, the activity is attributed to the Lazarus group.

Pulse ID: 6920e39c52bbf117c94af4ba
Pulse Link: otx.alienvault.com/pulse/6920e
Pulse Author: AlienVault
Created: 2025-11-21 22:11:40

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #ICS #InfoSec #Lazarus #Malware #OTX #OpenThreatExchange #RAT #Windows #bot #AlienVault

2025-11-16
Harald 哈拉德Harald@mastodontech.de
2025-11-13

FpcUpDeLuxe with a new version

You find the brand new FpcUpDeLuxe for easy installation of FreePascal and / or Lazarus IDE here:

github.com/LongDirtyAnimAlf/fp

With FpcUpDeLuxe everyone is able to setup different environments for software developement with FreePascal and Lazarus.

One code for many platforms ...

#Lazarus #FreePascal #Programming

🇨🇦OhOkayKayOhOkayKay@mstdn.ca
2025-11-13

Prime: Lazarus, series, 2025
7/10
Only part way through but so far it's worth watching the rest. Tons of plot twists, good acting, and just enough gore to be considered a thriller.
And there's the ever brilliant Bill Nighy that pulls it altogether.
#HarlanCoben #Lazarus

2025-11-12

Gotta fly: Lazarus targets the UAV sector

Pulse ID: 69142ea5363129b306273e35
Pulse Link: otx.alienvault.com/pulse/69142
Pulse Author: Tr1sa111
Created: 2025-11-12 06:52:21

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Lazarus #OTX #OpenThreatExchange #bot #Tr1sa111

2025-11-11

Lazarus Group targets Aerospace and Defense with new Comebacker variant

Pulse ID: 6912e49d1db9578054439342
Pulse Link: otx.alienvault.com/pulse/6912e
Pulse Author: Tr1sa111
Created: 2025-11-11 07:24:13

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Comebacker #CyberSecurity #InfoSec #Lazarus #OTX #OpenThreatExchange #bot #Tr1sa111

2025-11-10

Gotta fly: Targeting the UAV sector

ESET researchers have uncovered a new instance of Operation DreamJob, a cyberespionage campaign attributed to the North Korea-aligned Lazarus group. The attackers targeted European companies in the defense industry, particularly those involved in unmanned aerial vehicle (UAV) technology. The campaign aligns with North Korea's efforts to enhance its drone program, likely aiming to steal proprietary information and manufacturing know-how. The attackers used social engineering techniques, trojanized open-source projects, and deployed the ScoringMathTea RAT. The toolset included various droppers, loaders, and downloaders, with execution chains delivering BinMergeLoader and ScoringMathTea. The campaign's focus on UAV technology reflects North Korea's investment in drone manufacturing and its reliance on reverse engineering and intellectual property theft.

Pulse ID: 6910193940d4cd48acfd0529
Pulse Link: otx.alienvault.com/pulse/69101
Pulse Author: AlienVault
Created: 2025-11-09 04:31:53

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Cyberespionage #ESET #Espionage #Europe #InfoSec #Korea #Lazarus #Manufacturing #NorthKorea #OTX #OpenThreatExchange #RAT #RCE #SocialEngineering #Trojan #bot #AlienVault

2025-11-10

Lazarus Group targets Aerospace and Defense with new Comebacker variant

This analysis details a recent espionage campaign by the DPRK-nexus threat actor Lazarus Group targeting the aerospace and defense sectors. The campaign employs a new variant of the Comebacker backdoor, showcasing the actor's ongoing refinement of their malware arsenal. The attackers use highly specific lure documents, indicating a targeted spear phishing campaign. The malware's infection chain involves multiple stages, including custom decryption algorithms and encrypted C2 communications. The campaign's infrastructure remains active, suggesting potential ongoing operations. Organizations in the targeted sectors should remain vigilant against phishing attempts and strengthen their defenses against macro-based threats.

Pulse ID: 6911c89518dbf918e90866ee
Pulse Link: otx.alienvault.com/pulse/6911c
Pulse Author: AlienVault
Created: 2025-11-10 11:12:21

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Comebacker #CyberSecurity #DPRK #Espionage #InfoSec #Lazarus #Mac #Malware #OTX #OpenThreatExchange #Phishing #RAT #SpearPhishing #bot #AlienVault

Curt Johnson - Indie Geniusindiegenius
2025-11-08

Movie TV Tech Geeks 7 Miniseries To Watch if You Love Prime Video's 'Harlan Coben's Lazarus' dlvr.it/TP8jBT

No Soy Originalluisbermejo
2025-11-07

Acabo de ver Lazarus 1x06 "Heaven Is a Place on Earth" trakt.tv/shows/lazarus/seasons

No Soy Originalluisbermejo
2025-11-07

Viendo Lazarus 1x06 "Heaven Is a Place on Earth" trakt.tv/shows/lazarus/seasons

No Soy Originalluisbermejo
2025-11-07

Viendo Lazarus 1x06 "Heaven Is a Place on Earth" trakt.tv/shows/lazarus/seasons

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst