Article: The FireEye OT-CSIO: An Ontology to Understand, Cross-Compare, and Assess Operational Technology Cyber Security Incidents - published about 5 years ago. Content: The FireEye Operational Technology Cyber Security Incident Ontology (OT-CSIO) While the number of threats to operational technology (OT) have significantly increased since the discovery of Stuxnet – driven by factors such as the growing convergence with information technology (IT) networks and the increasing availability of OT information, technol... http://www.fireeye.com/blog/threat-research/2019/09/ontology-understand-assess-operational-technology-cyber-incidents.html Published: 2019 09 30 17:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: The Cyber Assessment Framework 3.0 - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-cyber-assessment-framework-3-0 Published: 2019 09 29 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Malware analysis report on SparrowDoor malware - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/mar-sparrowdoor Published: 2019 09 29 20:47:28 Received: 2024 07 02 11:02:14 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: 2019 Flare-On Challenge Solutions - published about 5 years ago. Content: We are pleased to announce the conclusion of the sixth annual Flare-On Challenge. The popularity of this event continues to grow and this year we saw a record number of players as well as finishers. We will break down the numbers later in the post, but right now let’s look at the fun stuff: the prize! Each of the 308 dedicated and amazing players t... http://www.fireeye.com/blog/threat-research/2019/09/2019-flare-on-challenge-solutions.html Published: 2019 09 28 00:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0064-2019 - Linux/AirDropBot - published about 5 years ago. Content: https://blog.malwaremustdie.org/2019/09/mmd-0064-2019-linuxairdropbot.html Published: 2019 09 27 17:35:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 27th September 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-27th-september-2019 Published: 2019 09 26 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The State of Malware Analysis: Advice from the Trenches - published about 5 years ago. Content: What malware analysis approaches work well? Which don't? How are the tools and methodologies evolving? The following discussion--captured as an MP3 audio file--offers friendly advice from 5 malware analysts. These are some of the practitioners who teach the reverse-engineering malware course (FOR610) at SANS Institute: Jim Clausing: Security Architect at... https://zeltser.com/state-of-malware-analysis/ Published: 2019 09 26 13:45:48 Received: 2021 06 06 09:05:26 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: Getting back to business - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/getting-back-to-business Published: 2019 09 26 08:04:20 Received: 2024 04 10 12:42:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Managing Public Domain Names - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/managing-public-domain-names Published: 2019 09 24 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Securing the cloud (by design *and* by default) - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/securing-the-cloud-by-design-and-by-default Published: 2019 09 23 23:00:00 Received: 2023 05 05 07:21:56 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Can you support the NCSC Cyber Schools Hub? - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/can-you-support-the-ncsc-cyber-schools-hubs Published: 2019 09 22 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: MMD-0063-2019 - Summary of 3 years MMD research (Sept 2016-Sept 2019) - published about 5 years ago. Content: https://blog.malwaremustdie.org/2019/09/mmd-0063-2019-summarize-report-of-three.html Published: 2019 09 21 12:21:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 20th September 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-20th-september-2019 Published: 2019 09 19 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Hacktivity 2018 badge - quick start guide for beginners - published about 5 years ago. Content: You either landed on this blog post because you are a huge fan of Hacktivity you bought this badge around a year ago you are just interested in hacker conference badge hacking. or maybe all of the above. Whatever the reasons, this guide should be helpful for those who never had any real-life experience with these little gadgets. But first things fi... https://jumpespjump.blogspot.com/2019/09/hacktivity-2018-badge-quick-start-guide.html Published: 2019 09 19 08:56:00 Received: 2024 03 12 23:22:32 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
Article: Getting started with cyber incident management - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/getting-started-with-cyber-incident-management Published: 2019 09 18 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The leaky pipe of secure coding - published about 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/leaky-pipe-secure-coding Published: 2019 09 18 08:01:29 Received: 2024 03 12 15:22:27 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The cyber threat to Universities - published about 5 years ago. Content: httpss://www.ncsc.gov.uk/report/the-cyber-threat-to-universities Published: 2019 09 18 08:01:29 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Trusted Research - protecting your research - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/trusted-research Published: 2019 09 17 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The cyber threat to Universities - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/the-cyber-threat-to-universities Published: 2019 09 17 23:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Trusted Research - protecting your research - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/trusted-research Published: 2019 09 17 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Five Thoughts on the Internet Freedom League - published about 5 years ago. Content: In the September/October issue of Foreign Affairs magazine, Richard Clarke and Rob Knake published an article titled "The Internet Freedom League: How to Push Back Against the Authoritarian Assault on the Web," based on their recent book The Fifth Domain. The article proposes the following: The United States and its allies and partners should stop worryin... https://taosecurity.blogspot.com/2019/09/five-thoughts-on-internet-freedom-league.html Published: 2019 09 13 15:00:00 Received: 2023 03 31 15:03:39 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 13th September 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-13th-september-2019 Published: 2019 09 12 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Getting back to business - published about 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/getting-back-to-business Published: 2019 09 12 07:35:20 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Managing supply chain risk in cloud-enabled products - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/managing-supply-chain-risk-cloud-enabled-products Published: 2019 09 09 05:07:34 Received: 2024 05 25 05:03:03 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Open Sourcing StringSifter - published about 5 years ago. Content: Malware analysts routinely use the Strings program during static analysis in order to inspect a binary's printable characters. However, identifying relevant strings by hand is time consuming and prone to human error. Larger binaries produce upwards of thousands of strings that can quickly evoke analyst fatigue, relevant strings occur less often tha... https://www.fireeye.com/blog/threat-research/2019/09/open-sourcing-stringsifter.html Published: 2019 09 07 17:00:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 6th September 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-6th-september-2019 Published: 2019 09 05 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment - published about 5 years ago. Content: UPDATE (Oct. 30, 2020): We have updated the report to include additional protection and containment strategies based on front-line visibility and response efforts in combating ransomware. While the full scope of recommendations included within the initial report remain unchanged, the following strategies have been added into the report: ... http://www.fireeye.com/blog/threat-research/2019/09/ransomware-protection-and-containment-strategies.html Published: 2019 09 05 09:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Cyber security - going back to school - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyber-security-going-back-to-school Published: 2019 09 04 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Incident trends report (October 2018 - April 2019) - published about 5 years ago. Content: httpss://www.ncsc.gov.uk/report/incident-trends-report Published: 2019 09 04 10:30:05 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: SharPersist: Windows Persistence Toolkit in C# - published about 5 years ago. Content: Background PowerShell has been used by the offensive community for several years now but recent advances in the defensive security industry are causing offensive toolkits to migrate from PowerShell to reflective C# to evade modern security products. Some of these advancements include Script Block Logging, Antimalware Scripting Interface (AMSI), and ... http://www.fireeye.com/blog/threat-research/2019/09/sharpersist-windows-persistence-toolkit.html Published: 2019 09 03 16:30:00 Received: 2021 11 03 23:00:22 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: How Sense of Privacy Threatens Facial Recognition's Protective Power - published about 5 years ago. Content: https://www.securitymagazine.com/articles/90812-how-sense-of-privacy-threatens-facial-recognitions-protective-power Published: 2019 09 02 04:00:00 Received: 2021 09 10 20:00:05 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Click to Open Code Editor