Article: Managing the risk of cloud-enabled products - published almost 7 years ago. Content: https://www.ncsc.gov.uk/guidance/managing-risk-cloud-enabled-products Published: 2017 11 30 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
Article: Operational Look at Sysinternals Sysmon 6.20 Update - published almost 7 years ago. Content: Sysmon has been a game changer for many organizations allowing their teams to fine tune their detection of malicious activity when combined with tools that aggregate and correlate events. A new version of Symon was recently released. Version 6.20 fixes bugs and adds new features. Some the of the note worthy changes for me are:Enhancements in WMI Logging. Ab... https://www.darkoperator.com/blog/2017/11/24/operational-look-at-sysinternals-sysmon-620-update Published: 2017 11 27 11:00:00 Received: 2023 12 19 11:23:26 Feed: Blog Source: Blog Category: Cyber Security Topic: Cyber Security |
|
Article: NCSC advice for Uber customers and drivers - published about 7 years ago. Content: https://www.ncsc.gov.uk/guidance/ncsc-advice-uber-customers-and-drivers Published: 2017 11 26 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Reflecting on your development processes: fast-track your learning - published about 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/reflecting-your-development-processes-fast-track-your-learning Published: 2017 11 24 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 24th November 2017 - published about 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-24th-november-2017 Published: 2017 11 23 05:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Firmware bugs are like buses - published about 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/firmware-bugs-are-buses Published: 2017 11 23 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Some Comments and Thoughts on Tradecraft - published about 7 years ago. Content: I have been writing a series on the new Windows Defender Exploit Guard features on Attack Surface Reduction where I cover my research on it. I'm researching the controls to add the information in to my personal playbook. Surprisingly in conversations with some Red Teamers I know they dismissed the information as it is a Blue/Defense technology. These comment... https://www.darkoperator.com/blog/2017/11/20/some-comments-and-thoughts-on-tradecraft Published: 2017 11 20 11:00:00 Received: 2021 06 06 09:05:08 Feed: Blog Source: Blog Category: Cyber Security Topic: Cyber Security |
|
Article: This Black Friday, we're giving away... advice! - published about 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/black-friday Published: 2017 11 20 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: A day in the life of an NCSC vulnerability researcher - published about 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/day-life-ncsc-vulnerability-researcher Published: 2017 11 17 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 17th November 2017 - published about 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-17th-november-2017 Published: 2017 11 16 05:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Windows Defender Exploit Guard ASR Rules for Office - published about 7 years ago. Content: On this blog post I continue looking at the ASR rules, this time I'm looking at the ASR rules for Office. The ASR rules for office are:Block Office applications from creating child processesBlock Office applications from creating executable contentBlock Office applications from injecting code into other processesBlock Win32 API calls from Office macroThese ... https://www.darkoperator.com/blog/2017/11/11/windows-defender-exploit-guard-asr-rules-for-office Published: 2017 11 14 11:00:00 Received: 2023 12 19 11:23:26 Feed: Blog Source: Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Wholesome guidance from the Sociotechnical Security Group - published about 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/wholesome-guidance-sociotechnical-security-group Published: 2017 11 14 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Oracle Security Alert for CVE-2017-10269 - 13 November 2017
- published about 7 years ago. Content: http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-10269-4021872.html Published: 2017 11 13 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Weekly Threat Report 10th November 2017 - published about 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-10th-november-2017 Published: 2017 11 09 05:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Windows Defender Exploit Guard ASR Obfuscated Script Rule - published about 7 years ago. Content: On this blog post I will cover my testing of the Attack Surface Reduction rule for Potentially Obfuscated Scripts. This is one of the features that intrigued me the most. One obfuscates the scripts for several reasons:Bypass detection controls like AV, automatic log analysis and other controls. Hinder analysis of the script to determine its purpose and actio... https://www.darkoperator.com/blog/2017/11/8/windows-defender-exploit-guard-asr-obfuscated-script-rule Published: 2017 11 08 12:00:00 Received: 2023 12 19 11:23:26 Feed: Blog Source: Blog Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor