Article: An Overview of the Jooble Platform - published about 5 years ago. Content: http://www.ehacking.net/2019/08/an-overview-of-jooble-platform.html Published: 2019 08 30 09:36:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
Article: Incident trends report (October 2018 - April 2019) - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/incident-trends-report Published: 2019 08 29 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 30th August 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-30th-august-2019 Published: 2019 08 29 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Incident trends report (October 2018 - April 2019) - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/incident-trends-report Published: 2019 08 29 23:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Weekly Threat Report 30th August 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-30th-august-2019 Published: 2019 08 29 23:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Definitive Dossier of Devilish Debug Details – Part One: PDB Paths and Malware - published about 5 years ago. Content: Have you ever wondered what goes through the mind of a malware author? How they build their tools? How they organize their development projects? What kind of computers and software they use? We took a stab and answering some of those questions by exploring malware debug information. We find that malware developers give descriptive names to their f... http://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html Published: 2019 08 29 22:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Cloud security made easier with Serverless - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cloud-security-made-easier-with-serverless Published: 2019 08 27 08:52:42 Received: 2024 09 24 08:41:19 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The Future Of iTunes For Windows: Bright or Not Much? - published about 5 years ago. Content: http://www.ehacking.net/2019/08/the-future-of-itunes-for-windows-bright.html Published: 2019 08 26 10:57:00 Received: 2021 06 06 09:04:42 Feed: Ethical Hacking-Your Way To The World Of IT Security Source: Ethical Hacking-Your Way To The World Of IT Security Category: Cyber Security Topic: Cyber Security |
|
Article: Healthcare: Research Data and PII Continuously Targeted by Multiple Threat Actors - published about 5 years ago. Content: The healthcare industry faces a range of threat groups and malicious activity. Given the critical role that healthcare plays within society and its relationship with our most sensitive information, the risk to this sector is especially consequential. It may also be one of the major reasons why we find healthcare to be one of the most retargeted indus... http://www.fireeye.com/blog/threat-research/2019/08/healthcare-research-data-pii-continuously-targeted-by-multiple-threat-actors.html Published: 2019 08 23 18:30:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 23rd August 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-august-2019 Published: 2019 08 22 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Time to shed Python 2 - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/time-to-shed-python-2 Published: 2019 08 21 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Maturity models in cyber security: what's happening to the IAMM? - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/maturity-models-cyber-security-whats-happening-iamm Published: 2019 08 20 06:07:28 Received: 2024 03 19 14:41:05 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Cloud security made easier with Serverless - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cloud-security-made-easier-with-serverless Published: 2019 08 19 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: GAME OVER: Detecting and Stopping an APT41 Operation - published about 5 years ago. Content: In August 2019, FireEye released the “Double Dragon” report on our newest graduated threat group, APT41. A China-nexus dual espionage and financially-focused group, APT41 targets industries such as gaming, healthcare, high-tech, higher education, telecommunications, and travel services. APT41 is known to adapt quickly to changes and detections wi... http://www.fireeye.com/blog/threat-research/2019/08/game-over-detecting-and-stopping-an-apt41-operation.html Published: 2019 08 19 17:30:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: 2019 DerbyCon Hiring List - published about 5 years ago. Content: https://malicious.link/post/2019/2019-derbycon-hiring-list/ Published: 2019 08 18 14:30:44 Received: 2021 06 06 09:05:32 Feed: Room362.com RSS Feed Source: Room362.com RSS Feed Category: News Topic: Hacking |
|
Article: Weekly Threat Report 16th August 2019 - published over 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-16th-august-2019 Published: 2019 08 15 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Windows 10 in S mode, and other updates - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/windows-10-in-s-mode Published: 2019 08 14 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Showing Vulnerability to a Machine: Automated Prioritization of Software Vulnerabilities - published over 5 years ago. Content: Introduction If a software vulnerability can be detected and remedied, then a potential intrusion is prevented. While not all software vulnerabilities are known, 86 percent of vulnerabilities leading to a data breach were patchable, though there is some risk of inadvertent damage when applying software patches. When new vulnerabilities are ide... https://www.fireeye.com/blog/threat-research/2019/08/automated-prioritization-of-software-vulnerabilities.html Published: 2019 08 13 16:45:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Offline backups in an online world - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/offline-backups-in-an-online-world Published: 2019 08 12 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Cloud security made easier with Serverless - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cloud-security-made-easier-with-serverless Published: 2019 08 09 03:08:19 Received: 2024 03 19 14:41:06 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Weekly Threat Report 9th August 2019 - published over 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-9th-august-2019 Published: 2019 08 08 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Finding Evil in Windows 10 Compressed Memory, Part Three: Automating Undocumented Structure Extraction - published over 5 years ago. Content: This is the final post in the three-part series: Finding Evil in Windows 10 Compressed Memory. In the first post (Volatility and Rekall Tools), the FLARE team introduced updates to both memory forensic toolkits. These updates enabled these open source tools to analyze previously inaccessible compressed data in memory. This research was shared... https://www.fireeye.com/blog/threat-research/2019/08/finding-evil-in-windows-ten-compressed-memory-part-three.html Published: 2019 08 08 20:45:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Finding Evil in Windows 10 Compressed Memory, Part Two: Virtual Store Deep Dive - published over 5 years ago. Content: Introduction This blog post is the second in a three-part series covering our Windows 10 memory forensics research and it coincides with our BlackHat USA 2019 presentation. In Part One of the series, we covered the integration of the research in both Volatily and Rekall memory forensics tools. We demonstrated that forensic artifacts (including... https://www.fireeye.com/blog/threat-research/2019/08/finding-evil-in-windows-ten-compressed-memory-part-two.html Published: 2019 08 08 20:30:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Cloud security made easier with Serverless - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cloud-security-made-easier-with-serverless Published: 2019 08 08 09:10:04 Received: 2024 02 15 09:42:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: A future with secure foundations - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/a-future-with-secure-foundations Published: 2019 08 08 03:00:00 Received: 2022 12 02 11:01:50 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Taking a data-driven approach to cyber security - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/taking-a-data-driven-approach-to-cyber-security Published: 2019 08 07 23:00:00 Received: 2022 07 23 23:20:20 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: CyBOK: more Knowledge Areas for review - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cybok-more-knowledge-areas-review Published: 2019 08 07 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Return of the living phishing guidance - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/return_of_phishing_guidance Published: 2019 08 07 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: CyBOK: more Knowledge Areas for review - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cybok-more-knowledge-areas-review Published: 2019 08 07 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Return of the living phishing guidance - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/return_of_phishing_guidance Published: 2019 08 07 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Commando VM 2.0: Customization, Containers, and Kali, Oh My! - published over 5 years ago. Content: The Complete Mandiant Offensive Virtual Machine (“Commando VM”) swept the penetration testing community by storm when it debuted in early 2019 at Black Hat Asia Arsenal. Our 1.0 release made headway featuring more than 140 tools. Well now we are back again for another spectacular release, this time at Black Hat USA Arsenal 2019! In this 2.0 release... http://www.fireeye.com/blog/threat-research/2019/08/commando-vm-customization-containers-kali.html Published: 2019 08 07 19:15:00 Received: 2021 11 03 23:00:22 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: APT41: A Dual Espionage and Cyber Crime Operation - published over 5 years ago. Content: Today, FireEye Intelligence is releasing a comprehensive report detailing APT41, a prolific Chinese cyber threat group that carries out state-sponsored espionage activity in parallel with financially motivated operations. APT41 is unique among tracked China-based actors in that it leverages non-public malware typically reserved for espionage campai... http://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html Published: 2019 08 07 12:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Virtualisation security design principles - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/virtualisation-security-design-principles Published: 2019 08 06 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Offline backups in an online world - published over 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/offline-backups-in-an-online-world Published: 2019 08 02 23:00:00 Received: 2022 08 19 12:21:23 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 2nd August 2019 - published over 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-2nd-august-2019 Published: 2019 08 01 23:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The Communications Assistance for Law Enforcement Act: a Lesson from the Past - published over 5 years ago. Content: https://www.securitymagazine.com/articles/90630-the-communications-assistance-for-law-enforcement-act-a-lesson-from-the-past Published: 2019 08 01 04:00:00 Received: 2021 09 10 20:00:05 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Click to Open Code Editor