Article: Applying the Cloud Security Principles in practice: a case study - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/applying-the-cloud-security-principles Published: 2018 12 03 23:00:00 Received: 2023 03 13 12:02:29 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Defending your university against the top 3 cyber threats - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/defending-your-university-against-top-3-cyber-threats Published: 2018 12 01 00:00:00 Received: 2022 12 19 09:02:04 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: NCSC advice for Marriott International customers - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/ncsc-advice-marriott-international-customers Published: 2018 11 30 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Obfuscated Command Line Detection Using Machine Learning - published almost 6 years ago. Content: This blog post presents a machine learning (ML) approach to solving an emerging security problem: detecting obfuscated Windows command line invocations on endpoints. We start out with an introduction to this relatively new threat capability, and then discuss how such problems have traditionally been handled. We then describe a machine learning appr... http://www.fireeye.com/blog/threat-research/2018/11/obfuscated-command-line-detection-using-machine-learning.html Published: 2018 11 29 17:00:00 Received: 2021 11 03 23:00:24 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Equities process - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/equities-process Published: 2018 11 29 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 23rd November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-november-2018 Published: 2018 11 23 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Let's have a cyber chat about Black Friday - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/lets-have-cyber-chat-about-black-friday Published: 2018 11 23 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 23rd November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-november-2018 Published: 2018 11 23 00:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Let's have a cyber chat about Black Friday - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/lets-have-cyber-chat-about-black-friday Published: 2018 11 23 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Cmd and Conquer: De-DOSfuscation with flare-qdb - published about 6 years ago. Content: When Daniel Bohannon released his excellent DOSfuscation paper, I was fascinated to see how tricks I used as a systems engineer could help attackers evade detection. I didn’t have much to contribute to this conversation until I had to analyze a hideously obfuscated batch file as part of my job on the FLARE malware queue. Previously, I released fla... https://www.fireeye.com/blog/threat-research/2018/11/cmd-and-conquer-de-dosfuscation-with-flare-qdb.html Published: 2018 11 20 17:30:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: #TweetBlog: APT29, Phishing and the Challenges of Attribution - published about 6 years ago. Content: FireEye researchers, analysts and incident responders frequently share information and engage with the security community on Twitter and other social media platforms. Sometimes this information adds so much to ongoing discussions that we feel it is important to share on our blogs. Recently, we detected intrusion attempts against multiple industr... http://www.fireeye.com/blog/threat-research/2018/11/tweetblog-apt29-phishing-and-the-challenges-of-attribution.html Published: 2018 11 20 04:55:36 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 16th November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-16th-november-2018 Published: 2018 11 16 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: FLARE VM Update - published about 6 years ago. Content: FLARE VM is the first of its kind reverse engineering and malware analysis distribution on Windows platform. Since its introduction in July 2017, FLARE VM has been continuously trusted and used by many reverse engineers, malware analysts, and security researchers as their go-to environment for analyzing malware. Just like the ever-evolving securi... http://www.fireeye.com/blog/threat-research/2018/11/flare-vm-update.html Published: 2018 11 14 20:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Setting new foundations for the CCP scheme - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/setting-new-foundations-ccp-scheme Published: 2018 11 14 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Vulnerability Summary for the Week of November 5, 2018 - published about 6 years ago. Content: https://www.cisa.gov/news-events/bulletins/sb18-316 Published: 2018 11 12 21:12:54 Received: 2023 03 16 20:24:25 Feed: CISA Bulletins Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Bulletins Topic: Cyber Security |
|
Article: Threat Report 11th November 2022 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/threat-report-11th-november-2022 Published: 2018 11 11 00:00:00 Received: 2022 11 30 16:41:33 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Weekly Threat Report 9th November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-9th-november-2018 Published: 2018 11 09 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Application Development Guidance: Introduction - published about 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/application-development-guidance-introduction Published: 2018 11 08 16:54:37 Received: 2024 03 06 17:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance - published about 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/roca-infineon-tpm-and-secure-element-rsa-vulnerability-guidance Published: 2018 11 08 13:37:39 Received: 2024 03 06 17:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Meltdown' and 'Spectre' guidance - published about 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/meltdown-and-spectre-guidance Published: 2018 11 08 11:59:23 Received: 2024 03 06 17:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 2nd November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-2nd-november-2018 Published: 2018 11 02 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: CyberFirst: 4 years on - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberfirst-4-years Published: 2018 11 02 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 2nd November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-2nd-november-2018 Published: 2018 11 02 00:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: CyberFirst: 4 years on - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberfirst-4-years Published: 2018 11 02 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Website Security - published about 6 years ago. Content: https://us-cert.cisa.gov/ncas/tips/ST18-006 Published: 2018 11 01 16:20:50 Received: 2021 05 23 07:00:30 Feed: CISA Tips Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Tips Topic: Cyber Security |
|
Article: Sextortion emails: how to protect yourself - published about 6 years ago. Content: https://www.ncsc.gov.uk/guidance/sextortion-scams-how-to-protect-yourself Published: 2018 11 01 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Defending your university against the top 3 cyber threats - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/defending-your-university-against-top-3-cyber-threats Published: 2018 11 01 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Sextortion emails: how to protect yourself - published about 6 years ago. Content: https://www.ncsc.gov.uk/guidance/sextortion-scams-how-to-protect-yourself Published: 2018 11 01 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Introducing the Cyber Assessment Framework v2.0 - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-cyber-assessment-framework-v20 Published: 2018 10 31 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Firmware updates on Linux, and using data to influence procurement decisions - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/firmware-updates-linux-and-using-data-influence-procurement-decisions Published: 2018 10 30 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Helping secure public sector email with Mail Check - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/helping-secure-public-sector-email-mail-check Published: 2018 10 29 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 26th October 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-26th-october-2018 Published: 2018 10 25 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Ransomware: 'WannaCry' guidance for home users and small businesses - published about 6 years ago. Content: https://www.ncsc.gov.uk/guidance/wannacry-guidance-for-home-users-and-small-businesses Published: 2018 10 24 23:00:00 Received: 2022 06 03 23:40:06 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Weekly Threat Report 25th May 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-25th-may-2018 Published: 2018 10 24 23:00:00 Received: 2022 04 05 08:41:08 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: BT's proactive protection: Supporting the NCSC to make our customers safer - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/bts-proactive-protection-supporting-ncsc-make-our-customers-safer Published: 2018 10 24 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CyBOK - two new Knowledge Areas released for comment and review - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cybok---two-new-knowledge-areas-released-for-comment-and-review Published: 2018 10 22 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 19th October 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-19th-october-2018 Published: 2018 10 18 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Oracle Critical Patch Update Advisory - October 2018
- published about 6 years ago. Content: https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html Published: 2018 10 16 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Taking a Shine off Certificates - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/taking-shine-certificates Published: 2018 10 14 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Are security questions leaving a gap in your security? - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/are-security-questions-leaving-gap-your-security Published: 2018 10 13 00:00:00 Received: 2023 05 10 10:40:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Kanye’s Password - published about 6 years ago. Content: Everyone and his brother, inside of infosec and outside has been chortling at Kanye’s iPhone password. Its 00000. Not everyone is in on the joke. Some express OUTRAGE. “how dare you share that man’s password” (it was on CNN, its out there now). Some (and these remind me of the 4D Chess MAGA people) theorize that Kanye is thinking 12 steps ahead. He knew... https://www.infosecblog.org/2018/10/kanyes-password/ Published: 2018 10 12 22:48:44 Received: 2022 12 31 19:40:06 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
Article: High Performance Web Brute-Forcing 🕸🐏 - published about 6 years ago. Content: http://hiburn8.org/index.php/2018/09/13/high-performance-web-brute-forcing/ Published: 2018 10 11 17:43:06 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
|
Article: Weekly Threat Report 12th October 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-12th-october-2018 Published: 2018 10 11 04:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Joint report on publicly available hacking tools - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools Published: 2018 10 10 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: RATs, Mimikatz and other domestic pests - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/rats-mimikatz-and-other-domestic-pests Published: 2018 10 10 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Joint report on publicly available hacking tools - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/joint-report-on-publicly-available-hacking-tools Published: 2018 10 10 23:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: RATs, Mimikatz and other domestic pests - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/rats-mimikatz-and-other-domestic-pests Published: 2018 10 10 23:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Wait, what...? Another Windows 10 guidance update! - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/wait--what-----another-windows-10-guidance-update- Published: 2018 10 09 23:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Operating Offensively Against Sysmon - published about 6 years ago. Content: Sysmon is a tool written by Mark Russinovich that I have covered in multiple blog post and even wrote a PowerShell module called Posh-Sysmon to help with the generation of configuration files for it. Its main purpose is for the tracking of potentially malicious activity on individual hosts and it is based on the same technology as Procmon. It differs from ot... https://www.darkoperator.com/blog/2018/10/5/operating-offensively-against-sysmon Published: 2018 10 08 10:00:00 Received: 2023 12 19 11:23:26 Feed: Blog Source: Blog Category: Cyber Security Topic: Cyber Security |
Click to Open Code Editor