Article: Emulation of Kernel Mode Rootkits With Speakeasy - published almost 4 years ago. Content: In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you haven’t had a chance, give the post a read today. In addition to user mode emulation, Speakeasy also supports emulation of kernel mode Windows binaries. When malware authors employ kernel mode mal... https://www.fireeye.com/blog/threat-research/2021/01/emulation-of-kernel-mode-rootkits-with-speakeasy.html Published: 2021 01 20 16:45:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Cross domain security - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/cross-domain-security Published: 2021 01 20 15:11:19 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Ransomware Taskforce (RTF) announce framework to combat ransomware - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/ransomware-taskforce-rtf-announce-framework-to-combat-ransomware Published: 2021 01 20 12:23:09 Received: 2024 05 29 07:41:12 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/report/responsible-use-of-bgp-for-isp-interworking Published: 2021 01 20 12:19:18 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Second call for Academic Centres of Excellence in Cyber Security Education - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/second-call-for-acecse Published: 2021 01 20 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Technical report: Responsible use of the Border Gateway Protocol (BGP) for ISP interworking - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/responsible-use-of-bgp-for-isp-interworking Published: 2021 01 20 00:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Second call for Academic Centres of Excellence in Cyber Security Education - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/second-call-for-acecse Published: 2021 01 20 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Oracle Critical Patch Update Advisory - January 2021
- published almost 4 years ago. Content: https://www.oracle.com/security-alerts/cpujan2021.html Published: 2021 01 19 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452 - published almost 4 years ago. Content: UPDATE (Mar. 18): Mandiant recently observed targeted threat actors modifying mailbox folder permissions of user mailboxes to maintain persistent access to the targeted users' email messages. This stealthy technique is not usually monitored by defenders and provides threat actors a way to access the desired email messages using any com... http://www.fireeye.com/blog/threat-research/2021/01/remediation-and-hardening-strategies-for-microsoft-365-to-defend-against-unc2452.html Published: 2021 01 19 14:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Vulnerability Scanning: Keeping on top of the most common threats - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/vulnerability-scanning-keeping-on-top-of-the-most-common-threats Published: 2021 01 19 08:58:37 Received: 2024 03 12 13:42:54 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: What is OT malware? - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/what-is-ot-malware Published: 2021 01 19 08:58:01 Received: 2024 01 24 00:02:19 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Vulnerability scanning tools and services - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/vulnerability-scanning-tools-and-services Published: 2021 01 19 00:00:00 Received: 2023 08 24 09:01:57 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Vulnerability Scanning Tools and Services - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/vulnerability-scanning-tools-and-services Published: 2021 01 19 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Vulnerability Scanning: Keeping on top of the most common threats - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/vulnerability-scanning-keeping-on-top-of-the-most-common-threats Published: 2021 01 19 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Vulnerability Scanning Tools and Services - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/vulnerability-scanning-tools-and-services Published: 2021 01 19 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Exhausted, energised and overwhelmed - but in a good way! - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/exhausted-energised-and-overwhelmed-in-good-way Published: 2021 01 16 06:12:55 Received: 2024 01 18 10:22:34 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 15th January 2021 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-15th-january-2021 Published: 2021 01 15 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Protective DNS away from the office - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/protective-dns-away-from-office Published: 2021 01 15 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 15th January 2021 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-15th-january-2021 Published: 2021 01 15 00:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Protective DNS away from the office - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/protective-dns-away-from-office Published: 2021 01 15 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Converting NMAP XML Files to HTML with xsltproc - published almost 4 years ago. Content: NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit. This enables the scan data to be parsed by other tools such as Metasploit’s db_import or even NMAP’s own Zenmap GUI. While XML is great for parsing, it’s not really easy for humans to read. I have found several people are unaware of the fac... /blog/2021/01/converting-nmap-xml-files-to-html-with-xsltproc.html Published: 2021 01 14 16:30:00 Received: 2021 06 06 09:04:36 Feed: Secure Ideas: Professionally Evil! Source: Secure Ideas: Professionally Evil! Category: Cyber Security Topic: Cyber Security |
Article: Ring Adds End-to-End Encryption to Quell Security Uproar - published almost 4 years ago. Content: https://threatpost.com/ring-adds-end-to-end-encryption-to-quell-security-uproar/163042/ Published: 2021 01 14 13:28:22 Received: 2021 05 06 16:00:15 Feed: Threatpost – Cryptography Source: Threatpost Category: News Topic: Cryptography |
|
Article: Disinformation: Companies in the crosshairs - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/94020-disinformation-companies-in-the-crosshairs Published: 2021 01 12 05:00:00 Received: 2021 04 25 02:14:07 Feed: Security Magazine – Reports Source: Security Magazine Category: Reports Topic: Cyber Security |
|
Article: Five key benefits of privileged access management - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/94019-five-key-benefits-of-privileged-access-management Published: 2021 01 12 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: Data breaches: guidance for individuals and families - published almost 4 years ago. Content: https://www.ncsc.gov.uk/guidance/data-breaches Published: 2021 01 10 00:00:00 Received: 2022 11 23 13:21:41 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments - published almost 4 years ago. Content: https://us-cert.cisa.gov/ncas/alerts/aa21-008a Published: 2021 01 08 16:36:48 Received: 2021 05 23 07:00:29 Feed: CISA Alerts Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Alerts Topic: Cyber Security |
|
Article: Use threat hunting to anticipate the unknown - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/94080-use-threat-hunting-to-anticipate-the-unknown Published: 2021 01 08 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: Weekly Threat Report 8th January 2021 - published almost 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-8th-january-2021 Published: 2021 01 08 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: How You Can Start Learning Malware Analysis - published almost 4 years ago. Content: Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. You can get into this field by building upon your existing skills in any of these disciplines. As someone who's helped thousands of security professionals learn how to analyze malware at SANS Institute,... https://zeltser.com/start-learning-malware-analysis/ Published: 2021 01 06 16:09:04 Received: 2023 08 21 14:03:21 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: Erasing personal data from second-hand devices - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/erasing-personal-data-second-hand-devices Published: 2021 01 06 08:27:05 Received: 2024 03 06 17:21:24 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Researcher Breaks reCAPTCHA With Google’s Speech-to-Text API - published almost 4 years ago. Content: https://threatpost.com/researcher-breaks-recaptcha-speech-to-text-api/162734/ Published: 2021 01 04 21:45:55 Received: 2021 05 06 16:00:15 Feed: Threatpost – Cryptography Source: Threatpost Category: News Topic: Cryptography |
|
Article: GKE Auditor – Detect Google Kubernetes Engine Misconfigurations - published almost 4 years ago. Content: https://www.darknet.org.uk/2021/01/gke-auditor-detect-google-kubernetes-engine-misconfigurations/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2021 01 01 10:59:21 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
Article: Vulnerability Scanning: Keeping on top of the most common threats - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/vulnerability-scanning-keeping-on-top-of-the-most-common-threats Published: 2021 01 01 09:01:32 Received: 2024 03 12 16:22:51 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The art of targeted phishing: How not to get hooked - published almost 4 years ago. Content: https://www.securitymagazine.com/articles/94265-the-art-of-targeted-phishing-how-not-to-get-hooked Published: 2021 01 01 05:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Click to Open Code Editor