Article: OVERRULED: Containing a Potentially Destructive Adversary - published over 6 years ago. Content: Introduction FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry. Public reporting indicates this activity may be related to recent destructive attacks. FireEye's Managed Defense has responded to and contained numerous intrusions that we assess are related. The actor is leveraging pu... http://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html Published: 2018 12 21 19:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Updated EUD guidance for iOS and macOS - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/updated-eud-guidance-ios-and-macos Published: 2018 12 20 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Its the most wonderful time of the year – Patching - published over 6 years ago. Content: does that say patching plaster or patch faster? Remember back when Summer and Christmas break was a high time of concern. The kids were out of college and ready to try out their skills. Christmas was worse because so many people were out of the office, no one would notice. Or if they did the response would be limited. Now that’s what we call Tuesday af... https://www.infosecblog.org/2018/12/its-the-most-wonderful-time-of-the-year-patching/ Published: 2018 12 19 23:46:33 Received: 2022 12 31 19:40:06 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Keeping your security monitoring effective - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/keeping-your-security-monitoring-effective Published: 2018 12 19 00:00:00 Received: 2023 06 26 08:00:58 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: NCSC vulnerability disclosure co-ordination - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-vulnerability-disclosure-co-ordination Published: 2018 12 19 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Building the Cyber Security Body of Knowledge - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/building-cyber-security-body-knowledge-0 Published: 2018 12 18 15:55:49 Received: 2024 02 12 09:42:58 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Dealing with suspicious emails and text messages - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/suspicious-email-actions Published: 2018 12 17 00:00:00 Received: 2021 07 29 09:06:19 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: How to recover an infected device - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/hacked-device-action-to-take Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Recovering a hacked account - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/recovering-a-hacked-account Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Dealing with suspicious emails, phone calls and text messages - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/suspicious-email-actions Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: CyberUK 2017 – The Countdown Begins - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2017-countdown-begins Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: CYBERUK 2017: A thank you to all involved - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2017-thank-you-all-involved Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: CyberUK 2017 – The Countdown Begins - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2017-countdown-begins Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: CYBERUK 2017: A thank you to all involved - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2017-thank-you-all-involved Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: How to recover an infected device - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/hacked-device-action-to-take Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
![]() |
Article: Recovering a hacked account - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/recovering-a-hacked-account Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
![]() |
Article: Dealing with suspicious emails, phone calls and text messages - published over 6 years ago. Content: https://www.ncsc.gov.uk/guidance/suspicious-email-actions Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
Article: Windows 10 in S mode, and other updates - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/windows-10-in-s-mode Published: 2018 12 14 23:00:00 Received: 2023 08 21 07:00:56 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: What are Deep Neural Networks Learning About Malware? - published over 6 years ago. Content: An increasing number of modern antivirus solutions rely on machine learning (ML) techniques to protect users from malware. While ML-based approaches, like FireEye Endpoint Security’s MalwareGuard capability, have done a great job at detecting new threats, they also come with substantial development costs. Creating and curating a large set of useful... http://www.fireeye.com/blog/threat-research/2018/12/what-are-deep-neural-networks-learning-about-malware.html Published: 2018 12 13 17:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: FLARE Script Series: Automating Objective-C Code Analysis with Emulation - published over 6 years ago. Content: This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing a new IDAPython library – flare-emu – powered by IDA Pro and the Unicorn emulation framework that provides scriptable emulation features for the x86, x86_64, ARM, and ARM64 architectures to reverse engineers. Along ... https://www.fireeye.com/blog/threat-research/2018/12/automating-objective-c-code-analysis-with-emulation.html Published: 2018 12 12 17:30:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Secure development & deployment principles move to beta - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/secure-development-deployment-principles-move-beta Published: 2018 12 11 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Weekly Threat Report 7th December 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-7th-december-2018 Published: 2018 12 07 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Questions Every CEO Should Ask About Cyber Risks - published over 6 years ago. Content: https://us-cert.cisa.gov/ncas/tips/ST18-007 Published: 2018 12 04 15:52:00 Received: 2021 05 23 07:00:30 Feed: CISA Tips Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Tips Topic: Cyber Security |
Article: Applying the Cloud Security Principles in practice: a case study - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/applying-the-cloud-security-principles Published: 2018 12 03 23:00:00 Received: 2023 03 13 12:02:29 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Defending your university against the top 3 cyber threats - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/defending-your-university-against-top-3-cyber-threats Published: 2018 12 01 00:00:00 Received: 2022 12 19 09:02:04 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Click to Open Code Editor