Article: What’s It Like for a New CISO? - published about 5 years ago. Content: As of this writing, I've spent six months in the role of Chief Information Security Officer (CISO) at Axonius, a rapidly growing technology company. Though I've held a variety of leadership positions over the years, working in this capacity and setting is new for me. I've been capturing aspects of my journey in talks and articles so that others might learn ... https://zeltser.com/new-ciso-impressions/ Published: 2020 02 13 16:38:59 Received: 2021 06 06 09:05:26 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: Mitigating malware and ransomware attacks - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks Published: 2020 02 13 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: CAS(T) closed - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cas-t-closed Published: 2020 02 13 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Mitigating malware and ransomware attacks - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/mitigating-malware-and-ransomware-attacks Published: 2020 02 13 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
![]() |
Article: "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests - published about 5 years ago. Content: In May 2019, FireEye Threat Intelligence published a blog post exposing a network of English-language social media accounts that engaged in inauthentic behavior and misrepresentation that we assessed with low confidence was organized in support of Iranian political interests. Personas in that network impersonated candidates for U.S. House of Re... https://www.fireeye.com/blog/threat-research/2020/02/information-operations-fabricated-personas-to-promote-iranian-interests.html Published: 2020 02 12 12:30:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Managed Defense: The Analytical Mindset - published about 5 years ago. Content: When it comes to cyber security (managed services or otherwise), you’re ultimately reliant on analyst expertise to keep your environment safe. Products and intelligence are necessary pieces of the security puzzle to generate detection signal and whittle down the alert chaff, but in the end, an analyst’s trained eyes and investigative process are th... http://www.fireeye.com/blog/threat-research/2020/02/managed-defense-the-analytical-mindset.html Published: 2020 02 11 17:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Compiling a DLL using MingGW - published about 5 years ago. Content: https://malicious.link/post/2020/compiling-a-dll-using-mingw/ Published: 2020 02 09 14:30:44 Received: 2021 06 06 09:05:32 Feed: Room362.com RSS Feed Source: Room362.com RSS Feed Category: News Topic: Hacking |
![]() |
Article: Weekly Threat Report 7th February 2020 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-7th-february-2020 Published: 2020 02 07 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Design guidelines for high assurance products - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/design-guidelines-for-high-assurance-products Published: 2020 02 06 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Introducing the design guidelines for high assurance products - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-high-assurance-guidelines Published: 2020 02 06 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Design guidelines for high assurance products - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/design-guidelines-for-high-assurance-products Published: 2020 02 06 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
![]() |
Article: STOMP 2 DIS: Brilliance in the (Visual) Basics - published about 5 years ago. Content: Throughout January 2020, FireEye has continued to observe multiple targeted phishing campaigns designed to download and deploy a backdoor we track as MINEBRIDGE. The campaigns primarily targeted financial services organizations in the United States, though targeting is likely more widespread than those we’ve initially observed in our FireEye produc... http://www.fireeye.com/blog/threat-research/2020/01/stomp-2-dis-brilliance-in-the-visual-basics.html Published: 2020 02 05 14:15:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: CVE In The Hook – Monthly Vulnerability Review (January 2020 Issue) - published about 5 years ago. Content: https://toolswatch.org/2020/02/cve-in-the-hook-monthly-vulnerability-review-january-2020-issue/?utm_source=rss&utm_medium=rss&utm_campaign=cve-in-the-hook-monthly-vulnerability-review-january-2020-issue Published: 2020 02 05 12:06:05 Received: 2023 01 25 14:23:48 Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Category: News Topic: Security Tooling |
![]() |
Article: Shining a light on the cyber security marketplace - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/shining-a-light-on-the-cyber-security-marketplace Published: 2020 02 04 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Getting DNS Client Cached Entries with CIM/WMI - published about 5 years ago. Content: What is DNS CacheThe DNS cache maintains a database of recent DNS resolution in memory. This allows for faster resolution of hosts that have been queried in the recent past. To keep this cache fresh and reduce the chance of stale records the time of items in the cache is of 1 day on Windows clients. The DNS Client service in Windows is the one that manages t... https://www.darkoperator.com/blog/2020/1/14/getting-dns-client-cached-entries-with-cimwmi Published: 2020 02 03 10:00:00 Received: 2023 12 06 08:02:19 Feed: Blog Source: Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Effective steps to cyber exercise creation - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/effective-steps-to-cyber-exercise-creation Published: 2020 02 03 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Cyber exercise creation step class - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cyber-exercise-creation-step-class Published: 2020 02 03 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Effective steps to cyber exercise creation - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/effective-steps-to-cyber-exercise-creation Published: 2020 02 03 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
![]() |
Article: A Framework for Measuring InfoSec as a Business Function - published about 5 years ago. Content: https://www.securitymagazine.com/articles/91648-a-framework-for-measuring-infosec-as-a-business-function Published: 2020 02 02 05:00:00 Received: 2021 09 01 17:00:11 Feed: Security Magazine – Guidance Source: Security Magazine Category: Guidance Topic: Cyber Security |
![]() |
Article: Abusing DLL Misconfigurations — Using Threat Intelligence to Weaponize R&D - published about 5 years ago. Content: DLL Abuse Techniques Overview Dynamic-link library (DLL) side-loading occurs when Windows Side-by-Side (WinSxS) manifests are not explicit about the characteristics of DLLs being loaded by a program. In layman’s terms, DLL side-loading can allow an attacker to trick a program into loading a malicious DLL. If you are interested in learning more abo... http://www.fireeye.com/blog/threat-research/2020/01/abusing-dll-misconfigurations.html Published: 2020 01 31 16:45:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Weekly Threat Report 31st January 2020 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-31st-january-2020 Published: 2020 01 31 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: The future of telecoms in the UK - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk Published: 2020 01 30 09:20:01 Received: 2024 08 16 07:00:30 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: Active Cyber Defence (ACD) - The Third Year - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/acd-report-year-three Published: 2020 01 28 07:52:20 Received: 2024 12 16 09:01:26 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Summary of NCSC’s security analysis for the UK telecoms sector - published about 5 years ago. Content: httpss://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector Published: 2020 01 28 07:52:20 Received: 2024 03 06 17:21:28 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: NCSC advice on the use of equipment from high risk vendors in UK telecoms networks - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/ncsc-advice-on-the-use-of-equipment-from-high-risk-vendors-in-uk-telecoms-networks Published: 2020 01 28 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Summary of NCSC’s security analysis for the UK telecoms sector - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector Published: 2020 01 28 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: The future of telecoms in the UK - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk Published: 2020 01 28 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Summary of NCSC?s security analysis for the UK telecoms sector - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/summary-of-ncsc-security-analysis-for-the-uk-telecoms-sector Published: 2020 01 28 00:00:00 Received: 2021 04 18 14:04:42 Feed: NCSC – Report Feed Source: National Cyber Security Centre (NCSC) Category: Reports Topic: Cyber Security |
![]() |
Article: The future of telecoms in the UK - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk Published: 2020 01 28 00:00:00 Received: 2021 04 18 14:04:38 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
Article: NCSC advice on the use of equipment from high risk vendors in UK telecoms networks - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/ncsc-advice-on-the-use-of-equipment-from-high-risk-vendors-in-uk-telecoms-networks Published: 2020 01 28 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
![]() |
Article: Top 5 Critical CVEs Vulnerability from 2019 That Every CISO Must Patch Before He Gets Fired ! - published about 5 years ago. Content: https://toolswatch.org/2020/01/top-5-critical-cves-vulnerability-from-2019-that-every-ciso-must-patch-before-he-gets-fired/?utm_source=rss&utm_medium=rss&utm_campaign=top-5-critical-cves-vulnerability-from-2019-that-every-ciso-must-patch-before-he-gets-fired Published: 2020 01 25 09:44:59 Received: 2023 01 25 14:23:48 Feed: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Source: ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects Category: News Topic: Security Tooling |
![]() |
Article: Introducing Scanning Made Easy - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-scanning-made-easy Published: 2020 01 25 00:00:00 Received: 2022 12 02 11:01:47 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Nice Try: 501 (Ransomware) Not Implemented - published about 5 years ago. Content: An Ever-Evolving Threat Since January 10, 2020, FireEye has tracked extensive global exploitation of CVE-2019-19781, which continues to impact Citrix ADC and Gateway instances that are unpatched or do not have mitigations applied. We previously reported on attackers’ swift attempts to exploit this vulnerability and the post-compromise deploy... https://www.fireeye.com/blog/threat-research/2020/01/nice-try-501-ransomware-not-implemented.html Published: 2020 01 24 17:00:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
![]() |
Article: Weekly Threat Report 24th January 2020 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-24th-january-2020 Published: 2020 01 24 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Launch of the Academic Centres of Excellence in Cyber Security Education - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/launch-of-the-academic-centres-of-excellence-in-cyber-security-education Published: 2020 01 23 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Introducing new NCSC Mobile Device Guidance - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/introducing-new-ncsc-mobile-device-guidance Published: 2020 01 22 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: There's a hole in my bucket - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/theres-hole-my-bucket Published: 2020 01 20 15:02:51 Received: 2025 02 05 12:22:02 Feed: NCSC – Blog Feed Source: National Cyber Security Centre (NCSC) Category: Blogs Topic: Cyber Security |
![]() |
Article: Managing Active Directory groups from Linux - published about 5 years ago. Content: https://www.n00py.io/2020/01/managing-active-directory-groups-from-linux/ Published: 2020 01 17 17:27:39 Received: 2021 06 06 09:05:30 Feed: from:mubix #SharedLinks - Twitter Search Source: from:mubix #SharedLinks - Twitter Search Category: News Topic: Hacking |
![]() |
Article: Weekly Threat Report 17th January 2020 - published about 5 years ago. Content: https://www.ncsc.gov.uk/report/weekly-threat-report-17th-january-2020 Published: 2020 01 17 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: The RastaLabs experience - published about 5 years ago. Content: Introduction It was 20 November, and I was just starting to wonder what I would do during the next month. I had already left my previous job, and the new one would only start in January. Playing with PS4 all month might sound fun for some people, but I knew I would get bored quickly. Even though I have some limited red teaming experience, I always fe... https://jumpespjump.blogspot.com/2020/01/the-rastalabs-experience.html Published: 2020 01 16 14:54:00 Received: 2024 03 12 23:22:32 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
Article: 404 Exploit Not Found: Vigilante Deploying Mitigation for Citrix NetScaler Vulnerability While Maintaining Backdoor - published about 5 years ago. Content: As noted in Rough Patch: I Promise It'll Be 200 OK, our FireEye Mandiant Incident Response team has been hard at work responding to intrusions stemming from the exploitation of CVE-2019-19781. After analyzing dozens of successful exploitation attempts against Citrix ADCs that did not have the Citrix mitigation steps implemented, we’ve recogni... http://www.fireeye.com/blog/threat-research/2020/01/vigilante-deploying-mitigation-for-citrix-netscaler-vulnerability-while-maintaining-backdoor.html Published: 2020 01 16 03:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Secure communications principles - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/secure-communication-principles Published: 2020 01 16 00:00:00 Received: 2021 09 30 13:06:22 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Secure communications principles: alpha release - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/secure-communication-principles-alpha-release Published: 2020 01 16 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Article: Secure communication principles - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/secure-communication-principles Published: 2020 01 16 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: Secure communications principles: alpha release - published about 5 years ago. Content: https://www.ncsc.gov.uk/guidance/secure-communication-principles-alpha-release Published: 2020 01 16 00:00:00 Received: 2021 04 18 14:04:37 Feed: NCSC – Guidance Feed Source: National Cyber Security Centre (NCSC) Category: Guidance Topic: Cyber Security |
Article: MMD-0065-2020 - Linux/Mirai-Fbot's new encryption explained - published about 5 years ago. Content: https://blog.malwaremustdie.org/2020/01/mmd-0065-2020-linuxmirai-fbot.html Published: 2020 01 15 12:48:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
![]() |
Article: CISP migration set to take place - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cisp-migration-set-to-take-place Published: 2020 01 15 00:00:00 Received: 2022 04 06 09:01:11 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Article: CiSP migration set to take place - published about 5 years ago. Content: https://www.ncsc.gov.uk/blog-post/cisp-migration-set-to-take-place Published: 2020 01 15 00:00:00 Received: 2021 04 18 14:04:45 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
![]() |
Click to Open Code Editor