Article: Protecting internet-facing services on public service CNI - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/protecting-internet-facing-services-public-service-cni Published: 2020 12 31 15:06:29 Received: 2024 10 16 11:41:11 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The 5 Most-Wanted Threatpost Stories of 2020 - published almost 4 years ago. Content: https://threatpost.com/top-threatpost-stories-2020/162501/ Published: 2020 12 30 13:00:26 Received: 2021 05 06 16:00:15 Feed: Threatpost – Cryptography Source: Threatpost Category: News Topic: Cryptography |
|
Article: Power management: The next frontier in securing your enterprise - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/93869-power-management-the-next-frontier-in-securing-your-enterprise Published: 2020 12 29 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Beyond the Technical - Advise for those starting in Infosec - published almost 4 years ago. Content: https://www.darkoperator.com/blog/2020/12/28/beyond-the-technical-advise-for-those-starting-in-infosec Published: 2020 12 28 12:00:00 Received: 2021 06 06 09:05:08 Feed: Blog Source: Blog Category: Cyber Security Topic: Cyber Security |
Article: CloudFlare Gateway DNS Filtering - published almost 4 years ago. Content: With some downtime over the holidays, I was checking in to see if my ISP has added IPv6 support yet. But sadly nothing had changed in months. So just for fun, I reset up a 6 in 4 tunnel to Hurricane Electric from my router. Sending traffic in a tunnel to HE rather than directly to its destination isn’t exactly going to speed things up. I’ve also he... https://www.infosecblog.org/2020/12/cloudflare-gateway-dns-filtering/ Published: 2020 12 28 03:57:45 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Buying and selling second-hand devices - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/buying-selling-second-hand-devices Published: 2020 12 28 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Erasing personal data from second-hand devices - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/erasing-personal-data-second-hand-devices Published: 2020 12 28 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Buying and selling second-hand devices - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/buying-selling-second-hand-devices Published: 2020 12 28 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: vFeed, Inc. Introduces Vulnerability Common Patch Format Feature - published almost 4 years ago. Content: https://toolswatch.org/2020/12/vfeed-inc-introduces-vulnerability-common-patch-format-feature/?utm_source=rss&utm_medium=rss&utm_campaign=vfeed-inc-introduces-vulnerability-common-patch-format-feature Published: 2020 12 26 15:54:46 Received: 2023 01 25 14:23:47 Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Category: News Topic: Security Tooling |
Article: SUNBURST Additional Technical Details - published almost 4 years ago. Content: FireEye has discovered additional details about the SUNBURST backdoor since our initial publication on Dec. 13, 2020. Before diving into the technical depth of this malware, we recommend readers familiarize themselves with our blog post about the SolarWinds supply chain compromise, which revealed a global intrusion campaign by a sophisticated thr... http://www.fireeye.com/blog/threat-research/2020/12/sunburst-additional-technical-details.html Published: 2020 12 24 20:15:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Future-proofing data against hackers - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/93825-future-proofing-data-against-hackers Published: 2020 12 23 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: How to use publicly available information to support enterprise security - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/93934-how-to-use-publicly-available-information-to-support-enterprise-security Published: 2020 12 22 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Cyber security for farmers - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/cyber-security-for-farmers Published: 2020 12 22 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 18th December 2020 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-18th-december-2020 Published: 2020 12 18 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Cyber Accelerator end-of-year wrap-up from Cohort 6! - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/cohort-6-wrap-up Published: 2020 12 18 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 18th December 2020 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-18th-december-2020 Published: 2020 12 18 00:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Cyber Accelerator end-of-year wrap-up from Cohort 6! - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/cohort-6-wrap-up Published: 2020 12 18 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Navigating the different cyber services from the NCSC - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/navigating-ncsc-cyber-service Published: 2020 12 17 13:26:50 Received: 2024 10 02 16:00:27 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Supplier assurance: having confidence in your suppliers - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/supplier-assurance-having-confidence-in-your-suppliers Published: 2020 12 17 13:26:50 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Supplier assurance questions - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/guidance/supplier-assurance-questions Published: 2020 12 17 13:20:34 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: A first-hand account of ransomware: To pay or not to pay - published almost 4 years ago. Content: https://www.securitymagazine.com/blogs/14-security-blog/post/94180-a-first-hand-account-of-ransomware-to-pay-or-not-to-pay Published: 2020 12 17 05:00:00 Received: 2021 04 25 02:14:07 Feed: Security Magazine – Reports Source: Security Magazine Category: Reports Topic: Cyber Security |
|
Article: Secure home working on personal IT - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/secure-home-working-personal-it Published: 2020 12 17 00:00:00 Received: 2022 11 30 12:00:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Supplier assurance questions - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/supplier-assurance-questions Published: 2020 12 17 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Supplier assurance: having confidence in your suppliers - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/supplier-assurance-having-confidence-in-your-suppliers Published: 2020 12 17 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Supplier assurance questions - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/supplier-assurance-questions Published: 2020 12 17 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Port of Los Angeles to secure its supply chain with a Cyber Resilience Center - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/94172-port-of-los-angeles-to-secure-its-supply-chain-with-a-cyber-resilience-center Published: 2020 12 16 05:00:00 Received: 2021 04 25 02:14:07 Feed: Security Magazine – Reports Source: Security Magazine Category: Reports Topic: Cyber Security |
|
Article: SolarFlare Release: Password Dumper for SolarWinds Orion - published almost 4 years ago. Content: https://malicious.link/posts/2020/solarflare-release-password-dumper-for-solarwinds-orion/ Published: 2020 12 15 05:30:44 Received: 2023 10 18 05:45:29 Feed: Room362.com RSS Feed Source: Room362.com RSS Feed Category: News Topic: Hacking |
Article: Dealing with the SolarWinds Orion compromise - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/dealing-with-the-solarwinds-orion-compromise Published: 2020 12 15 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published almost 4 years ago. Content: 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorThe Resurgence of Russian Threat Actor, NOBELIUMDownload (627.7 MB). Email me if you need the password (see in my profile) Malware Inventory (work in progress)ReferenceI am sure you all saw the news. Links update... https://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html Published: 2020 12 14 14:47:00 Received: 2024 03 13 18:00:17 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Tackling complacency in the GSOC - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/94149-tackling-complacency-in-the-gsoc Published: 2020 12 14 13:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Winding down 2020 - published almost 4 years ago. Content: From a creative perspective, 2020 hasn’t been a bad year for me. I ended up writing, 80 blog posts (most of which were published elsewhere) created 54 videos, 48 podcasts, and 48 presentations and webinars. I guess lockdown gave me more time to mull on things and be more productive. Despite the fact that I am far more productive than the average per... https://javvadmalik.com/2020/12/14/winding-down-2020/ Published: 2020 12 14 12:47:56 Received: 2021 06 06 09:04:45 Feed: J4vv4D Source: J4vv4D Category: Cyber Security Topic: Cyber Security |
|
Article: Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor - published almost 4 years ago. Content: Executive Summary We have discovered a global intrusion campaign. We are tracking the actors behind this campaign as UNC2452. FireEye discovered a supply chain attack trojanizing SolarWinds Orion business software updates in order to distribute malware we call SUNBURST. The attacker’s post compromise activity leverages multiple techniq... http://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html Published: 2020 12 13 22:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 11th December 2020 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-11th-december-2020 Published: 2020 12 11 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: 10 years of '10 Steps to Cyber Security' - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security Published: 2020 12 10 23:00:00 Received: 2022 07 26 07:01:03 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The leaky pipe of secure coding - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/leaky-pipe-secure-coding Published: 2020 12 09 03:03:08 Received: 2024 01 09 20:20:56 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: New brochure published to support academic researchers - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ace-csr-brochure-2020 Published: 2020 12 09 02:26:40 Received: 2024 01 24 00:02:19 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Unauthorized Access of FireEye Red Team Tools - published almost 4 years ago. Content: Overview A highly sophisticated state-sponsored adversary stole FireEye Red Team tools. Because we believe that an adversary possesses these tools, and we do not know whether the attacker intends to use the stolen tools themselves or publicly disclose them, FireEye is releasing hundreds of countermeasures with this blog post to enable the broader ... http://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html Published: 2020 12 08 21:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Consider these credentials when hiring a ransomware negotiator - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/93919-consider-these-credentials-when-hiring-a-ransomware-negotiator Published: 2020 12 08 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: zANTI – Android Wireless Hacking Tool Free Download - published almost 4 years ago. Content: https://www.darknet.org.uk/2020/12/zanti-android-wireless-hacking-tool-free-download/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2020 12 07 13:15:28 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
Article: Protecting the supply chain in an era of disruptions - published almost 4 years ago. Content: https://www.csoonline.com/article/3599160/protecting-the-supply-chain-in-an-era-of-disruptions.html#tk.rss_businesscontinuity Published: 2020 12 07 11:00:00 Received: 2022 09 08 00:52:42 Feed: CSO Online - Business Continuity Source: CSO Online Category: News Topic: Business Continuity |
Article: Securing all that data from your physical security and IT systems - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/93760-securing-all-that-data-from-your-physical-security-and-it-systems Published: 2020 12 07 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Information as a barrier to progress: aligning infosec goals with business needs - published almost 4 years ago. Content: https://www.securitymagazine.com/blogs/14-security-blog/post/94101-information-as-a-barrier-to-progress-aligning-infosec-goals-with-business-needs Published: 2020 12 07 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: Using secure messaging, voice and collaboration apps - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/using-secure-messaging-voice-and-collaboration-apps Published: 2020 12 07 00:00:00 Received: 2022 11 06 23:41:41 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Supplier assurance questions - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/supplier-assurance-questions Published: 2020 12 06 13:45:03 Received: 2024 10 16 11:41:11 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: 10 years of '10 Steps to Cyber Security' - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/10-years-of-10-steps-to-cyber-security Published: 2020 12 04 23:00:00 Received: 2023 05 11 13:01:34 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: My top 5 videos of the year - published almost 4 years ago. Content: Following on from last weeks post in which I summed up my top 5 blogs of the year, the sequel that one person asked me for was, what were the most watched videos of mine during 2020? Well, wonder no more, as I give you the top 5 in reverse order, cue the Top of the Pops intro! 5: Social Distance Club Nothing to do with security and all to do with... https://javvadmalik.com/2020/12/04/my-top-5-videos-of-the-year/ Published: 2020 12 04 15:48:41 Received: 2021 06 06 09:04:45 Feed: J4vv4D Source: J4vv4D Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 4th December 2020 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-4th-december-2020 Published: 2020 12 04 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Defending software build pipelines from malicious attack - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/defending-software-build-pipelines-from-malicious-attack Published: 2020 12 03 00:00:00 Received: 2023 07 14 12:21:31 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: New brochure published to support academic researchers - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ace-csr-brochure-2020 Published: 2020 12 03 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: AIT fraud: what you need to know - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ait-fraud-what-you-need-to-know Published: 2020 12 02 17:26:40 Received: 2024 09 24 08:41:16 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: New brochure published to support academic researchers - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ace-csr-brochure-2020 Published: 2020 12 02 17:26:40 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Critical National Infrastructure in 2020 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/cni-in-2020 Published: 2020 12 02 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Using Speakeasy Emulation Framework Programmatically to Unpack Malware - published almost 4 years ago. Content: Andrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post focused on using Speakeasy as an automated malware sandbox of sorts, this entry will highlight another powerful use of the framework: automated malware unpacking. I will demonstrate, with code exampl... https://www.fireeye.com/blog/threat-research/2020/12/using-speakeasy-emulation-framework-programmatically-to-unpack-malware.html Published: 2020 12 01 20:30:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Mind the gap: Diversity & other challenges in the age of AI - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/94051-mind-the-gap-diversity-other-challenges-in-the-age-of-ai Published: 2020 12 01 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Introducing the protocol design principles - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-the-protocol-design-principles Published: 2020 12 01 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Click to Open Code Editor