Article: Getting back to business - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/getting-back-to-business Published: 2019 06 11 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Hunting COM Objects (Part Two) - published over 5 years ago. Content: Background As a follow up to Part One in this blog series on COM object hunting, this post will talk about taking the COM object hunting methodology deeper by looking at interesting COM object methods exposed in properties and sub-properties of COM objects. What is a COM Object? According to Microsoft, “The Microsoft Component Object Model (CO... http://www.fireeye.com/blog/threat-research/2019/06/hunting-com-objects-part-two.html Published: 2019 06 11 15:15:00 Received: 2021 11 03 23:00:22 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Applying the Cloud Security Principles in practice: a case study - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/applying-the-cloud-security-principles Published: 2019 06 11 07:32:02 Received: 2024 09 25 09:00:32 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Click to Open Code Editor