https://www.jpcert.or.jp/
JPCERT コーディネーションセンター
jpcert
https://blogs.jpcert.or.jp/en/2025/08/crossc2.html
CrossC2 Expanding Cobalt Strike Beacon to Cross-Platform Attacks - JPCERT/CC Eyes | JPCERT...
From September to December 2024, JPCERT/CC has confirmed incidents involving CrossC2, the extension tool to create Cobalt Strike Beacon for Linux OS. The...
cobalt strikecross platform
https://blogs.jpcert.or.jp/en/masubuchi/
List of “増渕 維摩(Yuma Masubuchi)” - JPCERT/CC Eyes | JPCERT Coordination Center...
jpcert cclistldquoyumardquo
https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
GobRAT malware written in Go language targeting Linux routers - JPCERT/CC Eyes | JPCERT...
JPCERT/CC has confirmed attacks that infected routers in Japan with malware around February 2023. This blog article explains the details of the attack...
malware writtengo language
https://techcratic.com/index.php/2025/12/05/jpcert-confirms-active-command-injection-attacks-on-array-ag-gateways/cybersecurity/cybersecurity/
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways - Techcratic
Dec 5, 2025 - info@thehackernews.com (The Hacker News) 2025-12-05 00:40:00 thehackernews.com Dec 05, 2025Ravie LakshmananVulnerability / Network Security A command...
command injectionjpcertactive
https://blogs.jpcert.or.jp/en/2023/08/yama.html
YAMA-Yet Another Memory Analyzer for malware detection - JPCERT/CC Eyes | JPCERT Coordination...
As attacks become more fileless and malware gets more obfuscated, it is getting more difficult to determine whether there is a malicious intent from a file by...
yet anothermalware detection
https://blogs.jpcert.or.jp/en/2023/09/tsubame_overflow_2023-04-06.html
TSUBAME Report Overflow (Apr-Jun 2023) - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
This TSUBAME Report Overflow series discuss monitoring trends of overseas TSUBAME sensors and other activities which the [Internet Threat Monitoring Quarterly...
jpcert cc eyesapr juntsubame
https://blogs.jpcert.or.jp/en/2025/11/APT-C-60_update.html
Update on Attacks by Threat Group APT-C-60 - JPCERT/CC Eyes | JPCERT Coordination Center official...
In JPCERT/CC Eyes, we previously reporte...
updateattacksthreatgroupapt
https://blogs.jpcert.or.jp/en/2025/02/spawnchimera.html
SPAWNCHIMERA Malware: The Chimera Spawning from Ivanti Connect Secure Vulnerability - JPCERT/CC...
In January 2025, Ivanti published an adv...
ivanti connect securemalware
Sponsored https://www.slayed.com/
SLAYED: High-End 4K Videos Featuring Beautiful Women Together
Watch unforgettable connections between stunning women in premium cinematic scenes. SLAYED delivers sensual all-female experiences and breathtaking 4K visuals...
https://blogs.jpcert.or.jp/en/2024/08/smaligadget.html
Dynamic Analysis Technique of Android Malware by Injecting Smali Gadgets - JPCERT/CC Eyes | JPCERT...
When dynamically analyzing Android malware, it is currently difficult to follow its code using debuggers unlike Windows malware. Although there is a technique...
dynamic analysistechnique
https://blogs.jpcert.or.jp/en/2023/08/maldocinpdf.html
MalDoc in PDF - Detection bypass by embedding a malicious Word file into a PDF file – - JPCERT/CC...
JPCERT/CC has confirmed that a new technique was used in an attack that occurred in July, which bypasses detection by embedding a malicious Word file into a...
pdf detectionmaldocbypassword
Sponsored https://www.mydirtyhobby.de/
MyDirtyHobby | Live Sex Chat, Cam Girls, Amateur Sex Community
https://blogs.jpcert.or.jp/en/2025/07/ivanti_cs.html
Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities - JPCERT/CC Eyes |...
JPCERT/CC Eyes previously introduced the...
ivanti connect securemalware
https://www.jpcert.or.jp/rss/
JPCERT コーディネーションセンター RSS
jpcertrss
Sponsored https://www.digitalplaygroundnetwork.com/
Digital Playground - The Best Adult Movies, Porn Series and HD Sex Videos
DigitalPlayground.com is the leader in high quality adult blockbuster movies and award winning sex parodies that feature the most exclusive pornstars online!...
https://blogs.jpcert.or.jp/ja/2025/10/APT-C-60_update.html
攻撃グループAPT-C-60による攻撃のアップデート - JPCERT/CC Eyes |...
以前のJPCERT/CC Eyesで、正規サービスを悪用した攻撃グループAPT-...
jpcert cc eyes
https://blogs.jpcert.or.jp/ja/
JPCERT/CC Eyes | JPCERTコーディネーションセンター公式ブログ
JPCERTコーディネーションセンター公式ブログ
jpcert cc eyes
https://blogs.jpcert.or.jp/en/2023/06/autoyara4flirt.html
How to Create F.L.I.R.T Signature Using Yara Rules for Static Analysis of ELF Malware - JPCERT/CC...
It has been observed that ELF malware removes symbol information during its build. This creates extra work in malware analysis to identify each function name...
f lcreatesignatureusing