Article: I'm gonna stop you, little phishie... - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/im-gonna-stop-you-little-phishie Published: 2019 01 03 09:11:17 Received: 2023 11 22 12:21:01 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Ever wondered how a cyber crime gang operates? - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/ever-wondered-how-cyber-crime-gang-operates Published: 2019 01 02 15:31:57 Received: 2024 03 06 17:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Developers need help too - published almost 6 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/developers-need-help-too Published: 2019 01 02 14:33:39 Received: 2024 03 06 17:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Developing the cyber security profession – have your say! - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/developing-cyber-security-profession-have-your-say Published: 2019 01 02 14:33:39 Received: 2023 12 18 12:02:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Developers need help too - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/developers-need-help-too Published: 2019 01 02 14:33:39 Received: 2023 11 22 12:21:59 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: OVERRULED: Containing a Potentially Destructive Adversary - published almost 6 years ago. Content: Introduction FireEye assesses APT33 may be behind a series of intrusions and attempted intrusions within the engineering industry. Public reporting indicates this activity may be related to recent destructive attacks. FireEye's Managed Defense has responded to and contained numerous intrusions that we assess are related. The actor is leveraging pu... http://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html Published: 2018 12 21 19:00:00 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Updated EUD guidance for iOS and macOS - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/updated-eud-guidance-ios-and-macos Published: 2018 12 20 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Its the most wonderful time of the year – Patching - published almost 6 years ago. Content: does that say patching plaster or patch faster? Remember back when Summer and Christmas break was a high time of concern. The kids were out of college and ready to try out their skills. Christmas was worse because so many people were out of the office, no one would notice. Or if they did the response would be limited. Now that’s what we call Tuesday af... https://www.infosecblog.org/2018/12/its-the-most-wonderful-time-of-the-year-patching/ Published: 2018 12 19 23:46:33 Received: 2022 12 31 19:40:06 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Keeping your security monitoring effective - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/keeping-your-security-monitoring-effective Published: 2018 12 19 00:00:00 Received: 2023 06 26 08:00:58 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: NCSC vulnerability disclosure co-ordination - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/ncsc-vulnerability-disclosure-co-ordination Published: 2018 12 19 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Building the Cyber Security Body of Knowledge - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/building-cyber-security-body-knowledge-0 Published: 2018 12 18 15:55:49 Received: 2024 02 12 09:42:58 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Dealing with suspicious emails and text messages - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/suspicious-email-actions Published: 2018 12 17 00:00:00 Received: 2021 07 29 09:06:19 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: How to recover an infected device - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/hacked-device-action-to-take Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Recovering a hacked account - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/recovering-a-hacked-account Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Dealing with suspicious emails, phone calls and text messages - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/suspicious-email-actions Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CyberUK 2017 – The Countdown Begins - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2017-countdown-begins Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: CYBERUK 2017: A thank you to all involved - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2017-thank-you-all-involved Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CyberUK 2017 – The Countdown Begins - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2017-countdown-begins Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: CYBERUK 2017: A thank you to all involved - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberuk-2017-thank-you-all-involved Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: How to recover an infected device - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/hacked-device-action-to-take Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Recovering a hacked account - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/recovering-a-hacked-account Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
|
Article: Dealing with suspicious emails, phone calls and text messages - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/suspicious-email-actions Published: 2018 12 17 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
Article: Windows 10 in S mode, and other updates - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/windows-10-in-s-mode Published: 2018 12 14 23:00:00 Received: 2023 08 21 07:00:56 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: What are Deep Neural Networks Learning About Malware? - published almost 6 years ago. Content: An increasing number of modern antivirus solutions rely on machine learning (ML) techniques to protect users from malware. While ML-based approaches, like FireEye Endpoint Security’s MalwareGuard capability, have done a great job at detecting new threats, they also come with substantial development costs. Creating and curating a large set of useful... http://www.fireeye.com/blog/threat-research/2018/12/what-are-deep-neural-networks-learning-about-malware.html Published: 2018 12 13 17:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: FLARE Script Series: Automating Objective-C Code Analysis with Emulation - published almost 6 years ago. Content: This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing a new IDAPython library – flare-emu – powered by IDA Pro and the Unicorn emulation framework that provides scriptable emulation features for the x86, x86_64, ARM, and ARM64 architectures to reverse engineers. Along ... https://www.fireeye.com/blog/threat-research/2018/12/automating-objective-c-code-analysis-with-emulation.html Published: 2018 12 12 17:30:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Secure development & deployment principles move to beta - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/secure-development-deployment-principles-move-beta Published: 2018 12 11 00:00:00 Received: 2021 04 18 14:04:46 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Weekly Threat Report 7th December 2018 - published almost 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-7th-december-2018 Published: 2018 12 07 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Questions Every CEO Should Ask About Cyber Risks - published almost 6 years ago. Content: https://us-cert.cisa.gov/ncas/tips/ST18-007 Published: 2018 12 04 15:52:00 Received: 2021 05 23 07:00:30 Feed: CISA Tips Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Tips Topic: Cyber Security |
Article: Applying the Cloud Security Principles in practice: a case study - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/applying-the-cloud-security-principles Published: 2018 12 03 23:00:00 Received: 2023 03 13 12:02:29 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Defending your university against the top 3 cyber threats - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/defending-your-university-against-top-3-cyber-threats Published: 2018 12 01 00:00:00 Received: 2022 12 19 09:02:04 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: NCSC advice for Marriott International customers - published almost 6 years ago. Content: https://www.ncsc.gov.uk/guidance/ncsc-advice-marriott-international-customers Published: 2018 11 30 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Obfuscated Command Line Detection Using Machine Learning - published almost 6 years ago. Content: This blog post presents a machine learning (ML) approach to solving an emerging security problem: detecting obfuscated Windows command line invocations on endpoints. We start out with an introduction to this relatively new threat capability, and then discuss how such problems have traditionally been handled. We then describe a machine learning appr... http://www.fireeye.com/blog/threat-research/2018/11/obfuscated-command-line-detection-using-machine-learning.html Published: 2018 11 29 17:00:00 Received: 2021 11 03 23:00:24 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Equities process - published almost 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/equities-process Published: 2018 11 29 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 23rd November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-november-2018 Published: 2018 11 23 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Let's have a cyber chat about Black Friday - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/lets-have-cyber-chat-about-black-friday Published: 2018 11 23 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 23rd November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-23rd-november-2018 Published: 2018 11 23 00:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
|
Article: Let's have a cyber chat about Black Friday - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/lets-have-cyber-chat-about-black-friday Published: 2018 11 23 00:00:00 Received: 2021 04 18 14:04:39 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
|
Article: Cmd and Conquer: De-DOSfuscation with flare-qdb - published about 6 years ago. Content: When Daniel Bohannon released his excellent DOSfuscation paper, I was fascinated to see how tricks I used as a systems engineer could help attackers evade detection. I didn’t have much to contribute to this conversation until I had to analyze a hideously obfuscated batch file as part of my job on the FLARE malware queue. Previously, I released fla... https://www.fireeye.com/blog/threat-research/2018/11/cmd-and-conquer-de-dosfuscation-with-flare-qdb.html Published: 2018 11 20 17:30:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: #TweetBlog: APT29, Phishing and the Challenges of Attribution - published about 6 years ago. Content: FireEye researchers, analysts and incident responders frequently share information and engage with the security community on Twitter and other social media platforms. Sometimes this information adds so much to ongoing discussions that we feel it is important to share on our blogs. Recently, we detected intrusion attempts against multiple industr... http://www.fireeye.com/blog/threat-research/2018/11/tweetblog-apt29-phishing-and-the-challenges-of-attribution.html Published: 2018 11 20 04:55:36 Received: 2021 11 03 23:00:23 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Threat Report 16th November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-16th-november-2018 Published: 2018 11 16 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: FLARE VM Update - published about 6 years ago. Content: FLARE VM is the first of its kind reverse engineering and malware analysis distribution on Windows platform. Since its introduction in July 2017, FLARE VM has been continuously trusted and used by many reverse engineers, malware analysts, and security researchers as their go-to environment for analyzing malware. Just like the ever-evolving securi... http://www.fireeye.com/blog/threat-research/2018/11/flare-vm-update.html Published: 2018 11 14 20:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Setting new foundations for the CCP scheme - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/setting-new-foundations-ccp-scheme Published: 2018 11 14 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Vulnerability Summary for the Week of November 5, 2018 - published about 6 years ago. Content: https://www.cisa.gov/news-events/bulletins/sb18-316 Published: 2018 11 12 21:12:54 Received: 2023 03 16 20:24:25 Feed: CISA Bulletins Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Bulletins Topic: Cyber Security |
|
Article: Threat Report 11th November 2022 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/threat-report-11th-november-2022 Published: 2018 11 11 00:00:00 Received: 2022 11 30 16:41:33 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
Article: Weekly Threat Report 9th November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-9th-november-2018 Published: 2018 11 09 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Application Development Guidance: Introduction - published about 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/application-development-guidance-introduction Published: 2018 11 08 16:54:37 Received: 2024 03 06 17:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: ROCA: Infineon TPM and Secure Element RSA Vulnerability Guidance - published about 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/roca-infineon-tpm-and-secure-element-rsa-vulnerability-guidance Published: 2018 11 08 13:37:39 Received: 2024 03 06 17:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Meltdown' and 'Spectre' guidance - published about 6 years ago. Content: httpss://www.ncsc.gov.uk/guidance/meltdown-and-spectre-guidance Published: 2018 11 08 11:59:23 Received: 2024 03 06 17:21:37 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Weekly Threat Report 2nd November 2018 - published about 6 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-2nd-november-2018 Published: 2018 11 02 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: CyberFirst: 4 years on - published about 6 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyberfirst-4-years Published: 2018 11 02 00:00:00 Received: 2021 04 18 14:04:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Click to Open Code Editor