Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published about 5 years ago. Content: Reference Amnesia / Radiation botnet samples targeting Remote Code Execution in CCTV DVR 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet2016-08-11 CyberX Radiation IoT Cybersecurity campaignDownload Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA174bf554c4bc30d172cf1... http://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html Published: 2019 10 06 21:16:00 Received: 2021 06 06 09:04:40 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: Linux/AirDropBot samples - published about 5 years ago. Content: Malware Must Die: MMD-0064-2019 - Linux/AirDropBot Mirai variant targeting Linksys E-series - Remote Code Execution tmUnblock.cgi Download. Email me if you need the password (see in my profile) Malware Inventory (work in progress)Links updated: Jan 19, 2023 Hashes MD5 SHA256 SHA1 85a8aad8d938c44c3f3f51089a60ec16 1a75... https://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html Published: 2019 10 06 20:37:00 Received: 2024 03 13 18:00:17 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Top 10 Cybersecurity Writing Mistakes - published about 5 years ago. Content: Want to strengthen your writing in under an hour? Watch the video I recorded to help you avoid the top 10 writing mistakes I've encountered when working as a cybersecurity professional. The mistakes you'll see in this video—and the practical tips for avoiding them—span the key aspects of technical writing: structure, look, words, tone, and informat... https://zeltser.com/cybersecurity-writing-mistakes/ Published: 2019 10 05 01:00:36 Received: 2022 11 02 21:04:34 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: NCSC vulnerability disclosure co-ordination - published about 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ncsc-vulnerability-disclosure-co-ordination Published: 2019 10 04 12:14:34 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Phishing, spear phishing and whaling; does it change the price of phish? - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/phishing-spear-phishing-and-whaling-does-it-change-price-phish Published: 2019 10 04 12:14:34 Received: 2024 01 31 09:21:08 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: NCSC vulnerability disclosure co-ordination - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-vulnerability-disclosure-co-ordination Published: 2019 10 04 12:14:34 Received: 2023 11 22 12:21:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Code of practice for app store operators and app developers - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/code-of-practice-for-app-store-operators-and-developers Published: 2019 10 04 06:20:29 Received: 2024 02 27 09:03:17 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 4th October 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-4th-october-2019 Published: 2019 10 03 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software - published about 5 years ago. Content: Introduction This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing something quite unusual. It is not a tool or a virtual machine distribution, nor is it a plugin or script for a popular reverse engineering tool or framework. Rather, it is a profile created for a consu... https://www.fireeye.com/blog/threat-research/2019/10/controlling-ida-pro-with-voice-control-software.html Published: 2019 10 03 17:00:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Head Fake: Tackling Disruptive Ransomware Attacks - published about 5 years ago. Content: Within the past several months, FireEye has observed financially-motivated threat actors employ tactics that focus on disrupting business processes by deploying ransomware in mass throughout a victim’s environment. Understanding that normal business processes are critical to organizational success, these ransomware campaigns have been accompanied w... http://www.fireeye.com/blog/threat-research/2019/10/head-fake-tackling-disruptive-ransomware-attacks.html Published: 2019 10 01 10:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: AR and VR: How Immersive Technology Is Bringing Cybersecurity Scenarios to Life - published about 5 years ago. Content: https://www.securitymagazine.com/articles/91016-ar-and-vr-how-immersive-technology-is-bringing-cybersecurity-scenarios-to-life Published: 2019 10 01 04:00:00 Received: 2021 09 01 17:00:11 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
|
Article: The FireEye OT-CSIO: An Ontology to Understand, Cross-Compare, and Assess Operational Technology Cyber Security Incidents - published about 5 years ago. Content: The FireEye Operational Technology Cyber Security Incident Ontology (OT-CSIO) While the number of threats to operational technology (OT) have significantly increased since the discovery of Stuxnet – driven by factors such as the growing convergence with information technology (IT) networks and the increasing availability of OT information, technol... http://www.fireeye.com/blog/threat-research/2019/09/ontology-understand-assess-operational-technology-cyber-incidents.html Published: 2019 09 30 17:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: The Cyber Assessment Framework 3.0 - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-cyber-assessment-framework-3-0 Published: 2019 09 29 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Malware analysis report on SparrowDoor malware - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/mar-sparrowdoor Published: 2019 09 29 20:47:28 Received: 2024 07 02 11:02:14 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: 2019 Flare-On Challenge Solutions - published about 5 years ago. Content: We are pleased to announce the conclusion of the sixth annual Flare-On Challenge. The popularity of this event continues to grow and this year we saw a record number of players as well as finishers. We will break down the numbers later in the post, but right now let’s look at the fun stuff: the prize! Each of the 308 dedicated and amazing players t... http://www.fireeye.com/blog/threat-research/2019/09/2019-flare-on-challenge-solutions.html Published: 2019 09 28 00:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: MMD-0064-2019 - Linux/AirDropBot - published about 5 years ago. Content: https://blog.malwaremustdie.org/2019/09/mmd-0064-2019-linuxairdropbot.html Published: 2019 09 27 17:35:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 27th September 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-27th-september-2019 Published: 2019 09 26 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The State of Malware Analysis: Advice from the Trenches - published about 5 years ago. Content: What malware analysis approaches work well? Which don't? How are the tools and methodologies evolving? The following discussion--captured as an MP3 audio file--offers friendly advice from 5 malware analysts. These are some of the practitioners who teach the reverse-engineering malware course (FOR610) at SANS Institute: Jim Clausing: Security Architect at... https://zeltser.com/state-of-malware-analysis/ Published: 2019 09 26 13:45:48 Received: 2021 06 06 09:05:26 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: Getting back to business - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/getting-back-to-business Published: 2019 09 26 08:04:20 Received: 2024 04 10 12:42:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Managing Public Domain Names - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/managing-public-domain-names Published: 2019 09 24 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Securing the cloud (by design *and* by default) - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/securing-the-cloud-by-design-and-by-default Published: 2019 09 23 23:00:00 Received: 2023 05 05 07:21:56 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Can you support the NCSC Cyber Schools Hub? - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/can-you-support-the-ncsc-cyber-schools-hubs Published: 2019 09 22 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: MMD-0063-2019 - Summary of 3 years MMD research (Sept 2016-Sept 2019) - published about 5 years ago. Content: https://blog.malwaremustdie.org/2019/09/mmd-0063-2019-summarize-report-of-three.html Published: 2019 09 21 12:21:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 20th September 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-20th-september-2019 Published: 2019 09 19 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Hacktivity 2018 badge - quick start guide for beginners - published about 5 years ago. Content: You either landed on this blog post because you are a huge fan of Hacktivity you bought this badge around a year ago you are just interested in hacker conference badge hacking. or maybe all of the above. Whatever the reasons, this guide should be helpful for those who never had any real-life experience with these little gadgets. But first things fi... https://jumpespjump.blogspot.com/2019/09/hacktivity-2018-badge-quick-start-guide.html Published: 2019 09 19 08:56:00 Received: 2024 03 12 23:22:32 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
Article: Getting started with cyber incident management - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/getting-started-with-cyber-incident-management Published: 2019 09 18 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The leaky pipe of secure coding - published about 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/leaky-pipe-secure-coding Published: 2019 09 18 08:01:29 Received: 2024 03 12 15:22:27 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The cyber threat to Universities - published about 5 years ago. Content: httpss://www.ncsc.gov.uk/report/the-cyber-threat-to-universities Published: 2019 09 18 08:01:29 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Trusted Research - protecting your research - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/trusted-research Published: 2019 09 17 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The cyber threat to Universities - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/the-cyber-threat-to-universities Published: 2019 09 17 23:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Trusted Research - protecting your research - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/trusted-research Published: 2019 09 17 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Five Thoughts on the Internet Freedom League - published about 5 years ago. Content: In the September/October issue of Foreign Affairs magazine, Richard Clarke and Rob Knake published an article titled "The Internet Freedom League: How to Push Back Against the Authoritarian Assault on the Web," based on their recent book The Fifth Domain. The article proposes the following: The United States and its allies and partners should stop worryin... https://taosecurity.blogspot.com/2019/09/five-thoughts-on-internet-freedom-league.html Published: 2019 09 13 15:00:00 Received: 2023 03 31 15:03:39 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 13th September 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-13th-september-2019 Published: 2019 09 12 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Getting back to business - published about 5 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/getting-back-to-business Published: 2019 09 12 07:35:20 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Managing supply chain risk in cloud-enabled products - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/managing-supply-chain-risk-cloud-enabled-products Published: 2019 09 09 05:07:34 Received: 2024 05 25 05:03:03 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Open Sourcing StringSifter - published about 5 years ago. Content: Malware analysts routinely use the Strings program during static analysis in order to inspect a binary's printable characters. However, identifying relevant strings by hand is time consuming and prone to human error. Larger binaries produce upwards of thousands of strings that can quickly evoke analyst fatigue, relevant strings occur less often tha... https://www.fireeye.com/blog/threat-research/2019/09/open-sourcing-stringsifter.html Published: 2019 09 07 17:00:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 6th September 2019 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-6th-september-2019 Published: 2019 09 05 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Ransomware Protection and Containment Strategies: Practical Guidance for Endpoint Protection, Hardening, and Containment - published about 5 years ago. Content: UPDATE (Oct. 30, 2020): We have updated the report to include additional protection and containment strategies based on front-line visibility and response efforts in combating ransomware. While the full scope of recommendations included within the initial report remain unchanged, the following strategies have been added into the report: ... http://www.fireeye.com/blog/threat-research/2019/09/ransomware-protection-and-containment-strategies.html Published: 2019 09 05 09:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Click to Open Code Editor