|
Article: Middle Brothers - published almost 5 years ago. Content: When we talk about privacy and surveillance, discussions usually involve talk of Governments keep the population under manners. But unlike the good old days of the eighteenth century, Governments aren’t the only ones with skin in the population monitoring, control, and profiteering business. We now have a whole slew of middle brothers aka big tech wanti... https://javvadmalik.com/2020/11/25/middle-brothers/ Published: 2020 11 25 18:54:44 Received: 2021 06 06 09:04:45 Feed: J4vv4D Source: J4vv4D Category: Cyber Security Topic: Cyber Security |
|
Article: The elephant in the data centre - published almost 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/the-elephant-in-the-data-centre Published: 2020 11 23 23:20:17 Received: 2024 03 12 16:22:52 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: Shop securely online this Black Friday - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/shop-securely-online-this-black-friday Published: 2020 11 23 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: Election Cyber Threats in the Asia-Pacific Region - published almost 5 years ago. Content: In democratic societies, elections are the mechanism for choosing heads of state and policymakers. There are strong incentives for adversary nations to understand the intentions and preferences of the people and parties that will shape a country's future path and to reduce uncertainty about likely winners. Mandiant Threat Intelligence regularly obs... http://www.fireeye.com/blog/threat-research/2020/11/election-cyber-threats-in-the-asia-pacific-region.html Published: 2020 11 22 23:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
|
Article: Weekly Threat Report 20th November 2020 - published almost 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-20th-november-2020 Published: 2020 11 20 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: The NCSAM Campaign - published almost 5 years ago. Content: For October’s National Cyber Security Awareness month, I put together a few videos and blogs. In my mind it formed a campaign, but for various reasons, the timings were a bit inconsistent and the different resources ended up on different places. So as a recap – I put everything from this year into this one blog post. Hey just because the month is over doesn... https://javvadmalik.com/2020/11/19/the-ncsam-campaign/ Published: 2020 11 19 09:29:12 Received: 2021 06 06 09:04:45 Feed: J4vv4D Source: J4vv4D Category: Cyber Security Topic: Cyber Security |
|
|
Article: The leaky pipe of secure coding - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/leaky-pipe-secure-coding Published: 2020 11 18 08:54:09 Received: 2024 12 04 14:40:31 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
|
Article: The elephant in the data centre - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-elephant-in-the-data-centre Published: 2020 11 14 19:45:17 Received: 2025 04 08 10:41:36 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 13th November 2020 - published almost 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-13th-november-2020 Published: 2020 11 13 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The elephant in the data centre - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-elephant-in-the-data-centre Published: 2020 11 13 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: Weekly Threat Report 13th November 2020 - published almost 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-13th-november-2020 Published: 2020 11 13 00:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
|
Article: The elephant in the data centre - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-elephant-in-the-data-centre Published: 2020 11 13 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Deepfakes could compromise your company’s security - published almost 5 years ago. Content: https://www.securitymagazine.com/articles/93476-deepfakes-could-compromise-your-companys-security Published: 2020 11 12 07:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
|
Article: Cyber Accelerator finds sixth gear - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyber-accelerator-finds-sixth-gear Published: 2020 11 12 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: Active Cyber Defence (ACD) - The Second Year - published almost 5 years ago. Content: httpss://www.ncsc.gov.uk/report/active-cyber-defence-report-2019 Published: 2020 11 11 08:01:15 Received: 2024 03 06 17:21:25 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: Designing and building a privately hosted PKI - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/designing-and-building-a-privately-hosted-pki Published: 2020 11 11 06:11:09 Received: 2024 02 26 14:20:51 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
|
Article: CISSPs from Around the World - published almost 5 years ago. Content: ISC2’s blog has an feature where they interview CISSPs from around the world, and I see this month they interview Javvad Malik. Its a nice interview, but nothing compared to his original piece on the benefits of being a CISSP. Watch this video on YouTube. The post CISSPs from Around the World appeared first on Roger's Information Security Blog. ... https://www.infosecblog.org/2020/11/cissps-from-around-the-world/ Published: 2020 11 10 00:08:07 Received: 2022 11 06 01:20:54 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques - published almost 5 years ago. Content: Microsoft is known for their backwards compatibility. When they rolled out the 64-bit variant of Windows years ago they needed to provide compatibility with existing 32-bit applications. In order to provide seamless execution regardless of application bitness, the WoW (Windows on Windows) system was coined. This layer, which will be referred to as ... http://www.fireeye.com/blog/threat-research/2020/11/wow64-subsystem-internals-and-hooking-techniques.html Published: 2020 11 09 19:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
|
Article: US Cyber Command-sponsored cyber exercise will focus on critical infrastructure - published almost 5 years ago. Content: https://www.securitymagazine.com/articles/93876-us-cyber-command-sponsored-cyber-exercise-will-focus-on-critical-infrastructure Published: 2020 11 09 16:25:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: New Book! The Best of TaoSecurity Blog, Volume 3 - published almost 5 years ago. Content: Introduction I published a new book!The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog series. It's in the Kindle Store, and if you have an Unlimited account, it's free. I also published a print edition, which is 485 pages. Book DescriptionThe book features the followi... https://taosecurity.blogspot.com/2020/11/new-book-best-of-taosecurity-blog.html Published: 2020 11 09 13:30:00 Received: 2024 03 14 12:46:07 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
|
|
Article: CNI system design: Secure Remote Access - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cni-system-design-secure-remote-access Published: 2020 11 09 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Introducing Host Based Capability (HBC) - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-host-based-capability-hbc Published: 2020 11 06 18:00:00 Received: 2022 11 06 23:41:41 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: Put your cybersecurity skills to the test in a virtual battlefield - published almost 5 years ago. Content: https://www.securitymagazine.com/articles/93859-put-your-cybersecurity-skills-to-the-test-in-a-virtual-battlefield Published: 2020 11 06 15:07:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Designing and building a privately hosted PKI - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/designing-and-building-a-privately-hosted-pki Published: 2020 11 06 11:09:07 Received: 2024 06 11 09:23:20 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: New interactive video - and related downloads - to help secondary school kids stay safe online - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberfirst-navigators-interactive-video-and-downloads-help-secondary-school-kids-stay-safe-online Published: 2020 11 06 11:09:05 Received: 2024 04 12 13:21:08 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
|
Article: Designing and building a privately hosted PKI - published almost 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/designing-and-building-a-privately-hosted-pki Published: 2020 11 06 11:09:05 Received: 2024 03 06 17:21:25 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: HELK – Open Source Threat Hunting Platform - published almost 5 years ago. Content: https://www.darknet.org.uk/2020/11/helk-open-source-threat-hunting-platform/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2020 11 06 10:46:55 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
|
Article: Weekly Threat Report 6th November 2020 - published almost 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-6th-november-2020 Published: 2020 11 06 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: Designing and building a privately hosted PKI - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/designing-and-building-a-privately-hosted-pki Published: 2020 11 06 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Introducing Host Based Capability (HBC) - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-host-based-capability-hbc Published: 2020 11 06 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: Weekly Threat Report 6th November 2020 - published almost 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-6th-november-2020 Published: 2020 11 06 00:00:00 Received: 2021 04 18 14:04:41 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
|
Article: Designing and building a privately hosted PKI - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/designing-and-building-a-privately-hosted-pki Published: 2020 11 06 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Introducing Host Based Capability (HBC) - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-host-based-capability-hbc Published: 2020 11 06 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
|
Article: In Wild Critical Buffer Overflow Vulnerability in Solaris Can Allow Remote Takeover — CVE-2020-14871 - published almost 5 years ago. Content: FireEye Mandiant has been investigating compromised Oracle Solaris machines in customer environments. During our investigations, we discovered an exploit tool on a customer’s system and analyzed it to see how it was attacking their Solaris environment. The FLARE team’s Offensive Task Force analyzed the exploit to determine how it worked, reproduced... http://www.fireeye.com/blog/threat-research/2020/11/critical-buffer-overflow-vulnerability-in-solaris-can-allow-remote-takeover.html Published: 2020 11 04 19:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
|
Article: Trape – OSINT Analysis Tool For People Tracking - published almost 5 years ago. Content: https://www.darknet.org.uk/2020/11/trape-osint-analysis-tool-for-people-tracking/?utm_source=rss&utm_medium=social&utm_campaign=darknetfeed Published: 2020 11 03 10:03:00 Received: 2021 06 06 09:04:42 Feed: Darknet - The Darkside Source: Darknet - The Darkside Category: Cyber Security Topic: Cyber Security |
|
Article: Live off the Land? How About Bringing Your Own Island? An Overview of UNC1945 - published almost 5 years ago. Content: Through Mandiant investigation of intrusions, the FLARE Advanced Practices team observed a group we track as UNC1945 compromise managed service providers and operate against a tailored set of targets within the financial and professional consulting industries by leveraging access to third-party networks (see this blog post for an in-depth descripti... http://www.fireeye.com/blog/threat-research/2020/11/live-off-the-land-an-overview-of-unc1945.html Published: 2020 11 02 19:15:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
|
Article: Every breath you take, they’ll be watching you - published almost 5 years ago. Content: https://www.securitymagazine.com/articles/93798-every-breath-you-take-theyll-be-watching-you Published: 2020 11 01 04:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
|
Article: In pursuit of diversity - published almost 5 years ago. Content: https://www.securitymagazine.com/articles/93799-in-pursuit-of-diversity Published: 2020 11 01 04:00:00 Received: 2021 04 25 02:14:06 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: Security and the One Percent: A Thought Exercise in Estimation and Consequences - published almost 5 years ago. Content: There's a good chance that if you're reading this post, you're the member of an exclusive club. I call it the security one percent, or the security 1% or #securityonepercent on Twitter. This is shorthand for the assortment of people and organizations who have the personnel, processes, technology, and support to implement somewhat robust digital security prog... https://taosecurity.blogspot.com/2020/10/security-and-one-percent-thought.html Published: 2020 10 31 20:11:00 Received: 2024 03 14 12:46:07 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
|
|
Article: Weekly Threat Report 30th October 2020 - published almost 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-30th-october-2020 Published: 2020 10 30 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Zero trust principles - beta release - published almost 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/zero-trust-principles-beta-release Published: 2020 10 29 00:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
|
Article: Unhappy Hour Special: KEGTAP and SINGLEMALT With a Ransomware Chaser - published almost 5 years ago. Content: Throughout 2020, ransomware activity has become increasingly prolific, relying on an ecosystem of distinct but co-enabling operations to gain access to targets of interest before conducting extortion. Mandiant Threat Intelligence has tracked several loader and backdoor campaigns that lead to the post-compromise deployment of ransomware, sometimes w... http://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html Published: 2020 10 28 22:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
|
Article: Welcome to ThreatPursuit VM: A Threat Intelligence and Hunting Virtual Machine - published almost 5 years ago. Content: Skilled adversaries can deceive detection and often employ new measures in their tradecraft. Keeping a stringent focus on the lifecycle and evolution of adversaries allows analysts to devise new detection mechanisms and response processes. Access to the appropriate tooling and resources is critical to discover these threats within a timely and a... http://www.fireeye.com/blog/threat-research/2020/10/threatpursuit-vm-threat-intelligence-and-hunting-virtual-machine.html Published: 2020 10 28 15:30:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
|
Article: Flare-On 7 Challenge Solutions - published about 5 years ago. Content: We are thrilled to announce the conclusion of the seventh annual Flare-On challenge. This year proved to be the most difficult challenge we’ve produced, with the lowest rate of finishers. This year’s winners are truly the elite of the elite! Lucky for them, all 260 winners will receive this cyberpunk metal key. We would like to thank the challe... http://www.fireeye.com/blog/threat-research/2020/10/flare-on-7-challenge-solutions.html Published: 2020 10 24 00:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: MITRE ATT&CK Tactics Are Not Tactics - published about 5 years ago. Content: Just what are "tactics"?IntroductionMITRE ATT&CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else.The MITRE ATT&CK Design and Philosophy document from March 2020 says the following:At a high-level, ATT&CK is a... https://taosecurity.blogspot.com/2020/10/mitre-att-tactics-are-not-tactics.html Published: 2020 10 23 14:00:00 Received: 2024 07 14 03:04:06 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
|
|
Article: Weekly Threat Report 23rd October 2020 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-october-2020 Published: 2020 10 22 23:00:00 Received: 2021 04 18 14:04:44 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Click to Open Code Editor