this post was submitted on 31 May 2024
90 points (97.9% liked)

Cybersecurity

5743 readers
118 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 5 months ago (1 children)

Yup. Although i'm not sure there are many (any?) malwares that don't have some form of persistence. Exploits requiring human intervention are usually just the first stage, and persistance is the second.

I dont know of any APTs that are purely memory only, but if you know of one please link so I can read up on it.

[–] [email protected] 2 points 5 months ago (1 children)
[–] [email protected] 1 points 5 months ago

Here is an alternative Piped link(s):

https://www.piped.video/watch?v=1f6YyH62jFE

Piped is a privacy-respecting open-source alternative frontend to YouTube.

I'm open-source; check me out at GitHub.