Article: Red team Arsenal(RTA) – An intelligent scanner to detect security vulnerability in companies layer 7 assets. - published over 6 years ago. Content: Red Team Arsenal is a web/network security scanner which has the capability to scan all company’s online facing assets and provide an holistic security view... [[ This is a content summary only. Visit our website for full links, other content, and more! ]] ... https://seclist.us/red-team-arsenalrta-an-intelligent-scanner-to-detect-security-vulnerability-in-companies-layer-7-assets.html Published: 2018 04 18 21:01:27 Received: 2022 06 05 09:48:25 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
Article: hollows_hunter – A process scanner detecting and dump hollowed PE modules. - published over 6 years ago. Content: hollows_hunter is a process scanner detecting and dumping hollowed PE modules. it Uses PE-sieve (DLL version): PE-sieve is n open source tool based on libpeconv. It scans a given process, searching for manually loaded or modified modules. When found, it dumps the modified/suspicious PE along with a report in JSON format, detailing about the found indicator. ... https://seclist.us/hollows_hunter-a-process-scanner-detecting-and-dump-hollowed-pe-modules.html Published: 2018 04 18 03:19:00 Received: 2022 07 28 18:50:49 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
|
Article: Blackbear – a fork of openssh-portable for penetration testing purposes. - published almost 7 years ago. Content: Disclamer: Do not use in production or on any public facing server. Use only in penetration testing context, while participating in capture the flag competitions or otherwise studying computer security. Blackbear project goals: The blackbear server is to be used as main payload for RCE exploits. Main goal is to have reliable interactive shell access (must b... https://seclist.us/blackbear-a-fork-of-openssh-portable-for-penetration-testing-purposes.html Published: 2018 04 17 20:32:25 Received: 2022 10 30 05:26:03 Feed: Security List Network™ Source: Security List Network™ Category: News Topic: Security Tooling |
|
Article: Oracle Critical Patch Update Advisory - April 2018
- published almost 7 years ago. Content: http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Published: 2018 04 17 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: NCSC IT: The architecture behind NCSC's IT system - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-it-architecture-behind-ncscs-it-system-0 Published: 2018 04 16 23:00:00 Received: 2022 07 23 23:20:25 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Offline backups in an online world - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/offline-backups-in-an-online-world Published: 2018 04 16 23:00:00 Received: 2022 07 23 23:20:25 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Industry 100 inspiring collaboration - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/industry-100-inspiring-collaboration Published: 2018 04 16 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Malicious Russian cyber activity: what does it mean for small organisations? - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/malicious-russian-cyber-activity-what-does-it-mean-small-organisations Published: 2018 04 16 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Industry 100 inspiring collaboration - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/industry-100-inspiring-collaboration Published: 2018 04 16 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Malicious Russian cyber activity: what does it mean for small organisations? - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/malicious-russian-cyber-activity-what-does-it-mean-small-organisations Published: 2018 04 16 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: CYBERUK 2018: Growing in confidence - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2018-growing-confidence Published: 2018 04 15 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 13th April 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-13th-april-2018 Published: 2018 04 11 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Solving Ad-hoc Problems with Hex-Rays API - published almost 7 years ago. Content: Introduction IDA Pro is the de facto standard when it comes to binary reverse engineering. Besides being a great disassembler and debugger, it is possible to extend it and include a powerful decompiler by purchasing an additional license from Hex-Rays. The ability to switch between disassembled and decompiled code can greatly reduce the analysi... https://www.fireeye.com/blog/threat-research/2018/04/solving-ad-hoc-problems-with-hex-rays-api.html Published: 2018 04 10 15:00:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: CYBERUK 2018: Let the games begin! (again) - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2018--let-the-games-begin---again- Published: 2018 04 05 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Fake Software Update Abuses NetSupport Remote Access Tool - published almost 7 years ago. Content: Over the last few months, FireEye has tracked an in-the-wild campaign that leverages compromised sites to spread fake updates. In some cases, the payload was the NetSupport Manager remote access tool (RAT). NetSupport Manager is a commercially available RAT that can be used legitimately by system administrators for remotely accessing client compute... https://www.fireeye.com/blog/threat-research/2018/04/fake-software-update-abuses-netsupport-remote-access-tool.html Published: 2018 04 05 15:00:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 6th April 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-6th-april-2018 Published: 2018 04 05 04:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: NHS Test and Trace app security redux - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/nhs-test-and-trace-app-security-redux Published: 2018 04 04 23:00:00 Received: 2023 05 03 06:02:23 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CYBERUK In Practice Track 3: Detect & Defend - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-in-practice-track-3-detect Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: How the NCSC thinks about security architecture - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/how-ncsc-thinks-about-security-architecture Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Introducing our EUD Guidance for Android 8 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-our-eud-guidance-android-8 Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: It's almost time to kick off CYBERUK 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/its-almost-time-kick-cyberuk-2018 Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: CYBERUK In Practice Track 3: Detect & Defend - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-in-practice-track-3-detect Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: How the NCSC thinks about security architecture - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/how-ncsc-thinks-about-security-architecture Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Introducing our EUD Guidance for Android 8 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-our-eud-guidance-android-8 Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: It's almost time to kick off CYBERUK 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/its-almost-time-kick-cyberuk-2018 Published: 2018 04 04 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: CYBERUK In Practice Track 2: Mitigation - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-in-practice-track-2--mitigation Published: 2018 04 03 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CYBERUK In Practice Track 4: Whole System Security - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-practice-track-4-whole-system-security Published: 2018 04 02 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CYBERUK In Practice Track 1: Vulnerabilities and Bug Hunting - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-in-practice-track-1--vulnerabilities-and-bug-hunting Published: 2018 03 28 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Manchester will be hosting our biggest CYBERUK yet - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/manchester-will-be-hosting-our-biggest-cyberuk-yet Published: 2018 03 27 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: SANNY Malware Delivery Method Updated in Recently Observed Attacks - published almost 7 years ago. Content: Introduction In the third week of March 2018, through FireEye’s Dynamic Threat Intelligence, FireEye discovered malicious macro-based Microsoft Word documents distributing SANNY malware to multiple governments worldwide. Each malicious document lure was crafted in regard to relevant regional geopolitical issues. FireEye has tracked the SANNY malwa... https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html Published: 2018 03 23 15:00:00 Received: 2022 05 23 16:06:48 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Maturity models in cyber security: what's happening to the IAMM? - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/maturity-models-cyber-security-whats-happening-iamm Published: 2018 03 23 00:00:00 Received: 2023 06 26 08:01:02 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Weekly Threat Report 23rd March 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-march-2018 Published: 2018 03 22 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published almost 7 years ago. Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems Research: Trend Micro There are two packages one is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package) Download Email me if you need the password Links updated: Jan 19, 2023 File information Part one (full package) #File Name... https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html Published: 2018 03 20 13:23:00 Received: 2024 03 13 18:00:18 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: This Black Friday, we're giving away... advice! - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/black-friday Published: 2018 03 20 00:00:00 Received: 2022 06 03 23:20:24 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Weekly Threat Report 16th March 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-16th-march-2018 Published: 2018 03 15 04:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Denial of Service guidance - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/denial-service-guidance Published: 2018 03 15 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Iranian Threat Group Updates Tactics, Techniques and Procedures in Spear Phishing Campaign - published almost 7 years ago. Content: Introduction From January 2018 to March 2018, through FireEye’s Dynamic Threat Intelligence, we observed attackers leveraging the latest code execution and persistence techniques to distribute malicious macro-based documents to individuals in Asia and the Middle East. We attribute this activity to TEMP.Zagros (reported by Palo Alto Networks and T... http://www.fireeye.com/blog/threat-research/2018/03/iranian-threat-group-updates-ttps-in-spear-phishing-campaign.html Published: 2018 03 13 16:15:00 Received: 2021 11 03 21:00:49 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: TLS 1.3: better for individuals - harder for enterprises - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/tls-13-better-individuals-harder-enterprises Published: 2018 03 09 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 9th March 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-9th-march-2018 Published: 2018 03 08 05:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Maturity models in cyber security: what's happening to the IAMM? - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/maturity-models-cyber-security-whats-happening-iamm Published: 2018 03 08 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: NCSC IT: Installing software updates without breaking things - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-it-installing-software-updates-without-breaking-things Published: 2018 03 08 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Maturity models in cyber security: what's happening to the IAMM? - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/maturity-models-cyber-security-whats-happening-iamm Published: 2018 03 08 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: NCSC IT: Installing software updates without breaking things - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-it-installing-software-updates-without-breaking-things Published: 2018 03 08 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Summary of NCSC?s security analysis for the UK telecoms sector - published almost 7 years ago. Content: https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector Published: 2018 03 06 00:00:00 Received: 2022 03 21 12:20:38 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Fixing all the things - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/fixing-all-things Published: 2018 03 06 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 2nd March 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-2nd-march-2018 Published: 2018 03 01 05:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: We're trying to cure cancer, why would anyone attack us? - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/were-trying-cure-cancer-why-would-anyone-attack-us Published: 2018 02 28 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The Trouble with Phishing - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/trouble-phishing Published: 2018 02 26 00:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Firmware updates on Linux, and using data to influence procurement decisions - published almost 7 years ago. Content: https://www.ncsc.gov.uk/blog-post/firmware-updates-linux-and-using-data-influence-procurement-decisions Published: 2018 02 23 00:00:00 Received: 2023 04 21 14:00:47 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Weekly Threat Report 23rd February 2018 - published almost 7 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-february-2018 Published: 2018 02 22 05:00:00 Received: 2021 04 18 14:04:48 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Click to Open Code Editor