Article: Solving Ad-hoc Problems with Hex-Rays API - published over 6 years ago. Content: Introduction IDA Pro is the de facto standard when it comes to binary reverse engineering. Besides being a great disassembler and debugger, it is possible to extend it and include a powerful decompiler by purchasing an additional license from Hex-Rays. The ability to switch between disassembled and decompiled code can greatly reduce the analysi... http://www.fireeye.com/blog/threat-research/2018/04/solving-ad-hoc-problems-with-hex-rays-api.html Published: 2018 04 10 15:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: CYBERUK 2018: Let the games begin! (again) - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2018--let-the-games-begin---again- Published: 2018 04 05 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Fake Software Update Abuses NetSupport Remote Access Tool - published over 6 years ago. Content: Over the last few months, FireEye has tracked an in-the-wild campaign that leverages compromised sites to spread fake updates. In some cases, the payload was the NetSupport Manager remote access tool (RAT). NetSupport Manager is a commercially available RAT that can be used legitimately by system administrators for remotely accessing client compute... https://www.fireeye.com/blog/threat-research/2018/04/fake-software-update-abuses-netsupport-remote-access-tool.html Published: 2018 04 05 15:00:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 6th April 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-6th-april-2018 Published: 2018 04 05 04:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: NHS Test and Trace app security redux - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/nhs-test-and-trace-app-security-redux Published: 2018 04 04 23:00:00 Received: 2023 05 03 06:02:23 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CYBERUK In Practice Track 3: Detect & Defend - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-in-practice-track-3-detect Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: How the NCSC thinks about security architecture - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/how-ncsc-thinks-about-security-architecture Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Introducing our EUD Guidance for Android 8 - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-our-eud-guidance-android-8 Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: It's almost time to kick off CYBERUK 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/its-almost-time-kick-cyberuk-2018 Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CYBERUK In Practice Track 3: Detect & Defend - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-in-practice-track-3-detect Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: How the NCSC thinks about security architecture - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/how-ncsc-thinks-about-security-architecture Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Introducing our EUD Guidance for Android 8 - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-our-eud-guidance-android-8 Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: It's almost time to kick off CYBERUK 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/its-almost-time-kick-cyberuk-2018 Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: CYBERUK In Practice Track 2: Mitigation - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-in-practice-track-2--mitigation Published: 2018 04 03 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CYBERUK In Practice Track 4: Whole System Security - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-practice-track-4-whole-system-security Published: 2018 04 02 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: CYBERUK In Practice Track 1: Vulnerabilities and Bug Hunting - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-in-practice-track-1--vulnerabilities-and-bug-hunting Published: 2018 03 28 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Manchester will be hosting our biggest CYBERUK yet - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/manchester-will-be-hosting-our-biggest-cyberuk-yet Published: 2018 03 27 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: SANNY Malware Delivery Method Updated in Recently Observed Attacks - published over 6 years ago. Content: Introduction In the third week of March 2018, through FireEye’s Dynamic Threat Intelligence, FireEye discovered malicious macro-based Microsoft Word documents distributing SANNY malware to multiple governments worldwide. Each malicious document lure was crafted in regard to relevant regional geopolitical issues. FireEye has tracked the SANNY malwa... https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html Published: 2018 03 23 15:00:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Maturity models in cyber security: what's happening to the IAMM? - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/maturity-models-cyber-security-whats-happening-iamm Published: 2018 03 23 00:00:00 Received: 2023 06 26 08:01:02 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Weekly Threat Report 23rd March 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-march-2018 Published: 2018 03 22 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published over 6 years ago. Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems Research: Trend Micro There are two packages one is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package) Download Email me if you need the password Links updated: Jan 19, 2023 File information Part one (full package) #File Name... https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html Published: 2018 03 20 13:23:00 Received: 2024 03 13 18:00:18 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: This Black Friday, we're giving away... advice! - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/black-friday Published: 2018 03 20 00:00:00 Received: 2022 06 03 23:20:24 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Weekly Threat Report 16th March 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-16th-march-2018 Published: 2018 03 15 04:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Denial of Service guidance - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/denial-service-guidance Published: 2018 03 15 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign - published over 6 years ago. Content: Introduction From January 2018 to March 2018, through FireEye’s Dynamic Threat Intelligence, we observed attackers leveraging the latest code execution and persistence techniques to distribute malicious macro-based documents to individuals in Asia and the Middle East. We attribute this activity to TEMP.Zagros (reported by Palo Alto Networks and T... http://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html Published: 2018 03 13 16:15:00 Received: 2021 11 03 21:00:49 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: TLS 1.3: better for individuals - harder for enterprises - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/tls-13-better-individuals-harder-enterprises Published: 2018 03 09 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 9th March 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-9th-march-2018 Published: 2018 03 08 05:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Maturity models in cyber security: what's happening to the IAMM? - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/maturity-models-cyber-security-whats-happening-iamm Published: 2018 03 08 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: NCSC IT: Installing software updates without breaking things - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-it-installing-software-updates-without-breaking-things Published: 2018 03 08 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Maturity models in cyber security: what's happening to the IAMM? - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/maturity-models-cyber-security-whats-happening-iamm Published: 2018 03 08 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: NCSC IT: Installing software updates without breaking things - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-it-installing-software-updates-without-breaking-things Published: 2018 03 08 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Summary of NCSC?s security analysis for the UK telecoms sector - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector Published: 2018 03 06 00:00:00 Received: 2022 03 21 12:20:38 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Fixing all the things - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/fixing-all-things Published: 2018 03 06 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 2nd March 2018 - published over 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-2nd-march-2018 Published: 2018 03 01 05:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: We're trying to cure cancer, why would anyone attack us? - published over 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/were-trying-cure-cancer-why-would-anyone-attack-us Published: 2018 02 28 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: The Trouble with Phishing - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/trouble-phishing Published: 2018 02 26 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Firmware updates on Linux, and using data to influence procurement decisions - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/firmware-updates-linux-and-using-data-influence-procurement-decisions Published: 2018 02 23 00:00:00 Received: 2023 04 21 14:00:47 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Weekly Threat Report 23rd February 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-february-2018 Published: 2018 02 22 05:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques Used Post-Exploitation and Pre-Mining - published almost 7 years ago. Content: Introduction FireEye researchers recently observed threat actors abusing CVE-2017-10271 to deliver various cryptocurrency miners. CVE-2017-10271 is a known input validation vulnerability that exists in the WebLogic Server Security Service (WLS Security) in Oracle WebLogic Server versions 12.2.1.2.0 and prior, and attackers can exploit it to remotel... https://www.fireeye.com/blog/threat-research/2018/02/cve-2017-10271-used-to-deliver-cryptominers.html Published: 2018 02 15 16:30:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Not perfect, but better: improving security one step at a time - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/not-perfect-better-improving-security-one-step-time Published: 2018 02 15 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Click to Open Code Editor