Article: [SANS ISC] Sandbox Evasion… With Just a Filename! - published over 2 years ago. Content: I published the following diary on isc.sans.edu: “Sandbox Evasion… With Just a Filename!“: Today, many sandbox solutions are available and deployed by most organizations to detonate malicious files and analyze their behavior. The main problem with some sandboxes is the filename used to submit the sample. The file can be named like “sample.exe”, “suspicio... https://blog.rootshell.be/2022/06/03/sans-isc-sandbox-evasion-with-just-a-filename/ Published: 2022 06 03 10:29:33 Received: 2022 06 26 19:48:02 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
Article: [SANS ISC] Houdini is Back Delivered Through a JavaScript Dropper - published over 2 years ago. Content: I published the following diary on isc.sans.edu: “Houdini is Back Delivered Through a JavaScript Dropper“: Houdini is a very old RAT that was discovered years ago. The first mention I found back is from 2013! Houdini is a simple remote access tool written in Visual Basic Script. The script is not very interesting because it is non-obfuscated and has just... https://blog.rootshell.be/2022/06/16/sans-isc-houdini-is-back-delivered-through-a-javascript-dropper/ Published: 2022 06 16 11:11:03 Received: 2022 06 26 19:48:02 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: [SANS ISC] Malicious PowerShell Targeting Cryptocurrency Browser Extensions - published over 2 years ago. Content: I published the following diary on isc.sans.edu: “Malicious PowerShell Targeting Cryptocurrency Browser Extensions“: While hunting, I found an interesting PowerShell script. After a quick check, my first conclusion was that it is again a simple info stealer. After reading the code more carefully, the conclusion was different: It targets crypto-currency b... https://blog.rootshell.be/2022/06/22/sans-isc-malicious-powershell-targeting-cryptocurrency-browser-extensions/ Published: 2022 06 22 10:42:58 Received: 2022 06 26 19:48:02 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: Cyber Security Base: Securing Software 1/2–31/12/2023 | Courses | Studies service - published over 2 years ago. Content: Sign into the MOOC learning environment to start studying the open online course. Cyber Security Base 2. Learn to recognize and combat typical ... https://studies.helsinki.fi/courses/cur/otm-cd588f27-eef6-480f-9f1c-30b201471d9f Published: 2022 06 26 17:16:53 Received: 2022 06 26 19:41:48 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
Article: Cyber Security X. — ECSM - European Cybersecurity Month - published over 2 years ago. Content: 10th edition of the cyber security conference organized by Czech Cyber Security Working Group focused on recent cyber topics. https://cybersecuritymonth.eu/countries/czech-republic/cyber-security-x Published: 2022 06 26 18:35:50 Received: 2022 06 26 19:41:48 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
|
Article: Managing cyber risks: Time to strengthen the cybersecurity arsenal | The Financial Express - published over 2 years ago. Content: 39% of organisations currently use a platform model to manage their digital attack surface. More Stories on. cyber security. https://www.financialexpress.com/industry/technology/managing-cyber-risks-time-to-strengthen-the-cybersecurity-arsenal/2573545/ Published: 2022 06 26 19:25:10 Received: 2022 06 26 19:41:48 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
|
Article: UK Data Subject Access Requests Hang In The Balance - Forbes - published over 2 years ago. Content: I write about Data Protection, Privacy and Cyber Security law. New! Follow this author to improve your content experience. https://www.forbes.com/sites/stewartroom/2022/06/26/uk-data-subject-access-requests-hang-in-the-balance/ Published: 2022 06 26 19:29:15 Received: 2022 06 26 19:41:48 Feed: Google Alert – "cyber security" Source: Google Alert Category: News Topic: Cyber Security |
Article: 7th Czech National Cyber Security Competition - European Cybersecurity Month - published over 2 years ago. Content: 7th edition of the Czech National Cyber Security Competition - part of European Cyber Security Challenge (ECSC) supported by ENISA. https://cybersecuritymonth.eu/countries/czech-republic/7th-czech-national-cyber-security-competition Published: 2022 06 26 18:55:43 Received: 2022 06 26 19:41:47 Feed: Google Alert – cybersecurity Source: Google Alert Category: News Topic: Cyber Security |
|
Article: Threat Intelligence Best-Practice Tips - Unite.AI - published over 2 years ago. Content: Alex is a cybersecurity researcher with over 20 years of experience in malware analysis. He has strong malware removal skills, and he writes for ... https://www.unite.ai/threat-intelligence-best-practice-tips/ Published: 2022 06 26 18:59:16 Received: 2022 06 26 19:21:55 Feed: Google Alert – cybersecurity Source: Google Alert Category: News Topic: Cyber Security |
|
Article: CommitStrip 'The Right Tool For The Right Job At The Right Time?' - Security Boulevard - published over 2 years ago. Content: ... post at: https://www.commitstrip.com/en/2022/06/08/the-right-tool-for-the-right-job-at-the-right-time/? · DevOps Connect:DevSecOps @ RSAC 2022. https://securityboulevard.com/2022/06/commitstrip-the-right-tool-for-the-right-job-at-the-right-time/ Published: 2022 06 26 17:55:53 Received: 2022 06 26 19:12:08 Feed: Google Alert - devsecops Source: Google Alert Category: News Topic: DevSecOps |
Click to Open Code Editor