Article: CYBERUK 2023 Technical Masterclass: call for abstracts now open - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2023-technical-masterclass-call Published: 2020 05 13 09:15:46 Received: 2024 04 12 13:21:12 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Drawing good architecture diagrams - published over 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/drawing-good-architecture-diagrams Published: 2020 05 13 09:15:46 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Analyzing Dark Crystal RAT, a C# Backdoor - published over 4 years ago. Content: The FireEye Mandiant Threat Intelligence Team helps protect our customers by tracking cyber attackers and the malware they use. The FLARE Team helps augment our threat intelligence by reverse engineering malware samples. Recently, FLARE worked on a new C# variant of Dark Crystal RAT (DCRat) that the threat intel team passed to us. We reviewed ope... http://www.fireeye.com/blog/threat-research/2020/05/analyzing-dark-crystal-rat-backdoor.html Published: 2020 05 12 14:30:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: High level privacy and security design for NHS COVID-19 contact tracing app - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/nhs-covid-19-app-privacy-security-report Published: 2020 05 09 16:00:00 Received: 2022 03 23 09:40:34 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Navigating the MAZE: Tactics, Techniques and Procedures Associated With MAZE Ransomware Incidents - published over 4 years ago. Content: Targeted ransomware incidents have brought a threat of disruptive and destructive attacks to organizations across industries and geographies. FireEye Mandiant Threat Intelligence has previously documented this threat in our investigations of trends across ransomware incidents, FIN6 activity, implications for OT networks, and other aspects... http://www.fireeye.com/blog/threat-research/2020/05/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html Published: 2020 05 07 23:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 8th May 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-8th-may-2020 Published: 2020 05 07 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Video conferencing: new guidance for individuals and for organisations - published over 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/video-conferencing-new-guidance-for-individuals-and-for-organisations Published: 2020 05 07 13:08:14 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Operational Thoughts in Trying Times - published over 4 years ago. Content: This post is as much as a reminder to myself of where I should focus on the multiple jobs I have and also share with the community are large what I consider important and key in this trying times. Last year a dinner I had a very nice conversation with my friend Ed Skoudis on security consultancies and how many operated. This conversation covered many aspect... https://www.darkoperator.com/blog/2020/5/6/operational-thoughts-in-trying-times Published: 2020 05 06 10:00:31 Received: 2021 06 06 09:05:08 Feed: Blog Source: Blog Category: Cyber Security Topic: Cyber Security |
|
Article: The security behind the NHS contact tracing app - published over 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/security-behind-nhs-contact-tracing-app Published: 2020 05 04 16:26:16 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: New Book! The Best of TaoSecurity Blog, Volume 1 - published over 4 years ago. Content: I'm very pleased to announce that I've published a new book! It's The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice. It's available now in the Kindle Store, and if you're a member of Kindle Unlimited, it's currently free. I may also publish a print version. If you're interested, please tell me on Twitter. ... https://taosecurity.blogspot.com/2020/05/new-book-best-of-taosecurity-blog.html Published: 2020 05 04 15:51:00 Received: 2024 03 14 12:46:08 Feed: TaoSecurity Source: TaoSecurity Category: Cyber Security Topic: Cyber Security |
|
Article: High level privacy and security design for NHS COVID-19 contact tracing app - published over 4 years ago. Content: httpss://www.ncsc.gov.uk/report/nhs-covid-19-app-privacy-security-report Published: 2020 05 04 15:40:13 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The security behind the NHS contact tracing app - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/security-behind-nhs-contact-tracing-app Published: 2020 05 03 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: High level privacy and security design for NHS COVID-19 contact tracing app - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/nhs-covid-19-app-privacy-security-report Published: 2020 05 03 23:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: The security behind the NHS contact tracing app - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/security-behind-nhs-contact-tracing-app Published: 2020 05 03 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: DECADE OF THE RATs: Novel Cross-Platform APT Attacks Targeting Linux Windows and Android - published over 4 years ago. Content: https://www.securitymagazine.com/articles/92253-decade-of-the-rats-novel-cross-platform-apt-attacks-targeting-linux-windows-and-android Published: 2020 05 01 04:00:00 Received: 2021 09 01 17:00:11 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
Article: Weekly Threat Report 1st May 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-1st-may-2020 Published: 2020 04 30 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: NCSC advice: Malicious software used to illegally mine cryptocurrency - published over 4 years ago. Content: httpss://www.ncsc.gov.uk/guidance/ncsc-advice-malicious-software-used-illegally-mine-cryptocurrency Published: 2020 04 30 18:37:35 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Guidance following recent DoS attacks in the run up to the 2019 General Election - published over 4 years ago. Content: https://www.ncsc.gov.uk/guidance/guidance-following-recent-dos-attacks-2019-general-election Published: 2020 04 30 18:31:18 Received: 2024 08 02 11:01:13 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Terminology: it's not black and white - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/terminology-its-not-black-and-white Published: 2020 04 29 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: EL AL Airlines: Integrating Security into CI/CD with Seeker IAST from Synopsys - published over 4 years ago. Content: https://www.securitymagazine.com/articles/92264-el-al-airlines-integrating-security-into-cicd-with-seeker-iast-from-synopsys Published: 2020 04 29 04:00:00 Received: 2021 04 25 02:14:07 Feed: Security Magazine – Reports Source: Security Magazine Category: Reports Topic: Cyber Security |
|
Article: Terminology: it's not black and white - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/terminology-its-not-black-and-white Published: 2020 04 29 00:00:00 Received: 2022 11 16 08:02:09 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The cyber threat to Universities - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/the-cyber-threat-to-universities Published: 2020 04 28 23:00:00 Received: 2022 07 20 11:40:39 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Excelerating Analysis, Part 2 — X[LOOKUP] Gon’ Pivot To Ya - published over 4 years ago. Content: In December 2019, we published a blog post on augmenting analysis using Microsoft Excel for various data sets for incident response investigations. As we described, investigations often include custom or proprietary log formats and miscellaneous, non-traditional forensic artifacts. There are, of course, a variety of ways to tackle this task, but ... http://www.fireeye.com/blog/threat-research/2020/04/excelerating-analysis-lookup-pivot.html Published: 2020 04 28 17:30:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: The Duality of Attackers - Or Why Bad Guys are a Good Thing™ - published over 4 years ago. Content: The Duality of Attackers - Or Why Bad Guys are a Good Thing™ It’s no secret I've been on a spiritual journey the last few years. I tell most people it’s fundamentally changed my life and how I look at the world. I’m also a hacker and I’m constantly thinking about how to apply metaphysical or spiritual concepts into my daily life. Because if they are true... https://blog.carnal0wnage.com/2020/04/the-duality-of-attackers-or-why-bad.html Published: 2020 04 27 16:36:00 Received: 2024 02 19 11:44:44 Feed: Carnal0wnage and Attack Research Blog Source: Carnal0wnage and Attack Research Blog Category: News Topic: Hacking |
|
Article: Putting the Model to Work: Enabling Defenders With Vulnerability Intelligence — Intelligence for Vulnerability Management, Part Four - published over 4 years ago. Content: One of the critical strategic and tactical roles that cyber threat intelligence (CTI) plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk. In this four-part blog series, FireEye Mandiant Threat Intelligence highlights the v... http://www.fireeye.com/blog/threat-research/2020/04/enabling-defenders-with-vulnerability-intelligence.html Published: 2020 04 27 12:30:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 24th April 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-24th-april-2020 Published: 2020 04 23 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related Espionage - published over 4 years ago. Content: From at least January to April 2020, suspected Vietnamese actors APT32 carried out intrusion campaigns against Chinese targets that Mandiant Threat Intelligence believes was designed to collect intelligence on the COVID-19 crisis. Spear phishing messages were sent by the actor to China's Ministry of Emergency Management as well as the government of... http://www.fireeye.com/blog/threat-research/2020/04/apt32-targeting-chinese-government-in-covid-19-related-espionage.html Published: 2020 04 22 14:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Video conferencing services: security guidance for organisations - published over 4 years ago. Content: https://www.ncsc.gov.uk/guidance/video-conferencing-services-security-guidance-organisations Published: 2020 04 20 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Video conferencing services: using them securely - published over 4 years ago. Content: https://www.ncsc.gov.uk/guidance/video-conferencing-services-using-them-securely Published: 2020 04 20 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Video conferencing: new guidance for individuals and for organisations - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/video-conferencing-new-guidance-for-individuals-and-for-organisations Published: 2020 04 20 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Video conferencing services: security guidance for organisations - published over 4 years ago. Content: https://www.ncsc.gov.uk/guidance/video-conferencing-services-security-guidance-organisations Published: 2020 04 20 23:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Video conferencing services: using them securely - published over 4 years ago. Content: https://www.ncsc.gov.uk/guidance/video-conferencing-services-using-them-securely Published: 2020 04 20 23:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: 4-20 VB Low TAble - published over 4 years ago. Content: https://www.cisa.gov/news-events/bulletins/na-3 Published: 2020 04 20 21:13:30 Received: 2023 03 16 20:24:25 Feed: CISA Bulletins Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Bulletins Topic: Cyber Security |
Article: Separating the Signal from the Noise: How Mandiant Intelligence Rates Vulnerabilities — Intelligence for Vulnerability Management, Part Three - published over 4 years ago. Content: One of the critical strategic and tactical roles that cyber threat intelligence (CTI) plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk. In this four-part blog series, FireEye Mandiant Threat Intelligence highlights the v... http://www.fireeye.com/blog/threat-research/2020/04/how-mandiant-intelligence-rates-vulnerabilities.html Published: 2020 04 20 12:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Learning Malware Analysis and Cybersecurity Writing Online - published over 4 years ago. Content: You can now take my malware analysis and cybersecurity writing courses online in two formats at SANS Institute, depending on how you prefer to learn: OnDemand: Self-paced, recorded training with four months of access to course materials and labs. You'll like this if you prefer to start, stop, or speed up training any time they want or who need the flexib... https://zeltser.com/malware-analysis-and-writing-online-training/ Published: 2020 04 20 03:31:40 Received: 2023 04 14 15:03:24 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: KPOT info stealer samples - published over 4 years ago. Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)Download 1 (from Didier Stevens' post)Download 2 (Proofpoint)Malware Inventory (work in progress)Links updated: Jan 19, 2023 References ... https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html Published: 2020 04 19 15:27:00 Received: 2024 03 13 18:00:17 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: Industry 100: a project in data driven security - published over 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/industry-100-a-project-in-data-driven-security Published: 2020 04 17 08:06:09 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: How to Set Up a SpiderFoot Server for OSINT Research - published over 4 years ago. Content: SpiderFoot is a tool for gathering Open Source Intelligence (OSINT) and threat intelligence about IPs, domains, e-mail addresses, and other research targets from many data sources, including services such as Shodan and Have I Been Pwned. Steve Micallef, the tool's author, offers a free, open source version of SpiderFoot. His team also provides an affordable... https://zeltser.com/spiderfoot-server-setup/ Published: 2020 04 17 01:10:28 Received: 2023 04 14 15:03:24 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: Industry 100: a project in data driven security - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/industry-100-a-project-in-data-driven-security Published: 2020 04 16 23:00:03 Received: 2022 11 30 12:00:44 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Weekly Threat Report 17th April 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-17th-april-2020 Published: 2020 04 16 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Industry 100: a project in data driven security - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/industry-100-a-project-in-data-driven-security Published: 2020 04 16 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 17th April 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-17th-april-2020 Published: 2020 04 16 23:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Industry 100: a project in data driven security - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/industry-100-a-project-in-data-driven-security Published: 2020 04 16 23:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Oracle Critical Patch Update Advisory - April 2020
- published over 4 years ago. Content: https://www.oracle.com/security-alerts/cpuapr2020.html Published: 2020 04 14 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: 5 steps to building an effective disaster preparedness plan - published over 4 years ago. Content: https://www.csoonline.com/article/3535570/5-steps-to-building-an-effective-disaster-preparedness-plan.html#tk.rss_businesscontinuity Published: 2020 04 14 10:00:00 Received: 2021 11 29 11:20:30 Feed: CSO Online - Business Continuity Source: CSO Online Category: News Topic: Business Continuity |
|
Article: Think Fast: Time Between Disclosure, Patch Release and Vulnerability Exploitation — Intelligence for Vulnerability Management, Part Two - published over 4 years ago. Content: One of the critical strategic and tactical roles that cyber threat intelligence (CTI) plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk. In this four-part blog series, FireEye Mandiant Threat Intelligence highlights the... http://www.fireeye.com/blog/threat-research/2020/04/time-between-disclosure-patch-release-and-vulnerability-exploitation.html Published: 2020 04 13 12:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 10th April 2020 - published over 4 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-10th-april-2020 Published: 2020 04 09 23:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Limited Shifts in the Cyber Threat Landscape Driven by COVID-19 - published over 4 years ago. Content: Though COVID-19 has had enormous effects on our society and economy, its effects on the cyber threat landscape remain limited. For the most part, the same actors we have always tracked are behaving in the same manner they did prior to the crisis. There are some new challenges, but they are perceptible, and we—and our customers—are prepared to conti... https://www.fireeye.com/blog/threat-research/2020/04/limited-shifts-in-cyber-threat-landscape-driven-by-covid-19.html Published: 2020 04 08 16:15:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: NCSC IT: There's confidence and then there's SaaS - published over 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ncsc-it-theres-confidence-and-then-theres-saas Published: 2020 04 08 11:22:22 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Reaching out to the next generation of Cyber Sprinters - published over 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/reaching-out-to-the-next-generation-of-cyber-sprinters Published: 2020 04 07 23:00:00 Received: 2022 07 23 23:20:18 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Click to Open Code Editor