Article: Security and the One Percent: A Thought Exercise in Estimation and Consequences - published about 4 years ago. Content: There's a good chance that if you're reading this post, you're the member of an exclusive club. I call it the security one percent, or the security 1% or #securityonepercent on Twitter. This is shorthand for the assortment of people and organizations who have the personnel, processes, technology, and support to implement somewhat robust digital security prog... https://taosecurity.blogspot.com/2020/10/security-and-one-percent-thought.html Published: 2020 10 31 20:11:00 Received: 2024 03 14 12:46:07 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 30th October 2020 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-30th-october-2020 Published: 2020 10 30 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Zero trust principles - beta release - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/zero-trust-principles-beta-release Published: 2020 10 29 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser - published about 4 years ago. Content: Throughout 2020, ransomware activity has become increasingly prolific, relying on an ecosystem of distinct but co-enabling operations to gain access to targets of interest before conducting extortion. Mandiant Threat Intelligence has tracked several loader and backdoor campaigns that lead to the post-compromise deployment of ransomware, sometimes w... http://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html Published: 2020 10 28 22:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Welcome to ThreatPursuit VM: A Threat Intelligence and Hunting Virtual Machine - published about 4 years ago. Content: Skilled adversaries can deceive detection and often employ new measures in their tradecraft. Keeping a stringent focus on the lifecycle and evolution of adversaries allows analysts to devise new detection mechanisms and response processes. Access to the appropriate tooling and resources is critical to discover these threats within a timely and a... http://www.fireeye.com/blog/threat-research/2020/10/threatpursuit-vm-threat-intelligence-and-hunting-virtual-machine.html Published: 2020 10 28 15:30:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Flare-On 7 Challenge Solutions - published about 4 years ago. Content: We are thrilled to announce the conclusion of the seventh annual Flare-On challenge. This year proved to be the most difficult challenge we’ve produced, with the lowest rate of finishers. This year’s winners are truly the elite of the elite! Lucky for them, all 260 winners will receive this cyberpunk metal key. We would like to thank the challe... http://www.fireeye.com/blog/threat-research/2020/10/flare-on-7-challenge-solutions.html Published: 2020 10 24 00:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: MITRE ATT&CK Tactics Are Not Tactics - published about 4 years ago. Content: Just what are "tactics"?IntroductionMITRE ATT&CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else.The MITRE ATT&CK Design and Philosophy document from March 2020 says the following:At a high-level, ATT&CK is a... https://taosecurity.blogspot.com/2020/10/mitre-att-tactics-are-not-tactics.html Published: 2020 10 23 14:00:00 Received: 2024 07 14 03:04:06 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 23rd October 2020 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-october-2020 Published: 2020 10 22 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Moving to a cloud, not a storm - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/move-to-a-cloud-not-a-storm Published: 2020 10 22 09:28:23 Received: 2024 02 15 09:42:35 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Fuzzilli – JavaScript Engine Fuzzing Library - published about 4 years ago. Content: https://www.darknet.org.uk/2020/10/fuzzilli-javascript-engine-fuzzing-library/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2020 10 22 09:04:37 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
Article: Bugs happen, so make sure you're ready to fix them - published about 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/bugs-happen-be-ready-to-fix-them Published: 2020 10 22 06:56:10 Received: 2024 03 06 17:21:25 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Moving to a cloud, not a storm - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/move-to-a-cloud-not-a-storm Published: 2020 10 21 14:18:15 Received: 2024 10 15 08:01:08 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Oracle Critical Patch Update Advisory - October 2020
- published about 4 years ago. Content: https://www.oracle.com/security-alerts/cpuoct2020.html Published: 2020 10 20 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: The CNI Hub goes live - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/cni-hub-live Published: 2020 10 18 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 16th October 2020 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-16th-october-2020 Published: 2020 10 15 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft - published about 4 years ago. Content: Mandiant Threat Intelligence recently promoted a threat cluster to a named FIN (or financially motivated) threat group for the first time since 2017. We have detailed FIN11's various tactics, techniques and procedures in a report that is available now by signing up for Mandiant Advantage Free. In some ways, FIN11 is reminiscent of APT1; they are n... http://www.fireeye.com/blog/threat-research/2020/10/fin11-email-campaigns-precursor-for-ransomware-data-theft.html Published: 2020 10 14 12:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Simple 'back-to-virtual-school' must-haves to implement in your organization - published about 4 years ago. Content: https://www.securitymagazine.com/articles/93266-simple-back-to-virtual-school-must-haves-to-implement-in-your-organization Published: 2020 10 14 08:34:00 Received: 2021 09 01 13:00:27 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: REMnux Tools List for Malware Analysis - published about 4 years ago. Content: REMnux® offers a curated collection of free tools for reverse-engineering or otherwise analyzing malicious software. How to find the right tool for the job, given how many useful utilities come as part of the distro? To guide you through the process of examining malware, REMnux documentation lists the installed tools by category. Each grouping, which you... https://zeltser.com/remnux-tools-list/ Published: 2020 10 13 16:14:40 Received: 2023 08 21 14:03:21 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: Small Business Guide: updated for 2020 - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/small-business-guide-2020 Published: 2020 10 10 23:00:00 Received: 2023 04 13 09:41:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: NHS COVID-19 app: improving its security posture - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/nhs-covid-19-app-improving-its-security-posture Published: 2020 10 10 23:00:00 Received: 2022 12 02 11:01:42 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Greg Rattray Invented the Term Advanced Persistent Threat - published about 4 years ago. Content: I was so pleased to read this Tweet yesterday from Greg Rattray:"Back in 2007, I coined the term “Advanced Persistent Threat” to characterize emerging adversaries that we needed to work with the defense industrial base to deal with... Since then both the APT term and the nature of our adversaries have evolved. What hasn’t changed is that in cyberspace, adva... https://taosecurity.blogspot.com/2020/10/greg-rattray-invented-term-advanced.html Published: 2020 10 10 15:30:00 Received: 2024 03 14 12:46:08 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
|
Article: Transforming the way we work, with 'missions' - published about 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/transforming-the-way-we-work-with-missions Published: 2020 10 09 07:25:55 Received: 2024 03 06 17:21:25 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Increased enterprise security for the “new normal” working culture - published about 4 years ago. Content: https://www.securitymagazine.com/articles/93386-increased-enterprise-security-in-the-new-normal-working-culture Published: 2020 10 09 05:40:00 Received: 2021 09 01 13:00:27 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: Weekly Threat Report 9th October 2020 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-9th-october-2020 Published: 2020 10 08 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Transforming the way we work, with 'missions' - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/transforming-the-way-we-work-with-missions Published: 2020 10 08 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 9th October 2020 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-9th-october-2020 Published: 2020 10 08 23:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Transforming the way we work, with 'missions' - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/transforming-the-way-we-work-with-missions Published: 2020 10 08 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: NHS COVID-19 app: improving its security posture - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/nhs-covid-19-app-improving-its-security-posture Published: 2020 10 07 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Small Business Guide: updated for 2020 - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/small-business-guide-2020 Published: 2020 10 07 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: NHS COVID-19 app: improving its security posture - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/nhs-covid-19-app-improving-its-security-posture Published: 2020 10 07 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Small Business Guide: updated for 2020 - published about 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/small-business-guide-2020 Published: 2020 10 07 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Weekly Threat Report 2nd October 2020 - published about 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-2nd-october-2020 Published: 2020 10 01 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Oracle Security Alert for CVE-2020-14750 - 01 November 2020
- published about 4 years ago. Content: https://www.oracle.com/security-alerts/alert-cve-2020-14750.html Published: 2020 10 01 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Group attribution error – The most pervasive and potentially consequential threat of our day - published about 4 years ago. Content: https://www.securitymagazine.com/articles/93517-group-attribution-error-the-most-pervasive-and-potentially-consequential-threat-of-our-day Published: 2020 10 01 04:00:00 Received: 2021 09 01 13:00:27 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Click to Open Code Editor