Article: [SANS ISC] From a Zalando Phishing to a RAT - published about 1 year ago. Content: Today, I published the following diary on isc.sans.edu: “From a Zalando Phishing to a RAT“: Phishing remains a lucrative threat. We get daily emails from well-known brands (like DHL, PayPal, Netflix, Microsoft, Dropbox, Apple, etc). Recently, I received a bunch of phishing emails targeting Zalando customers. Zalando is a German retailer of shoes, fashion... https://blog.rootshell.be/2023/08/18/sans-isc-from-a-zalando-phishing-to-a-rat/ Published: 2023 08 18 06:22:27 Received: 2023 08 26 11:40:20 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
Article: [SANS ISC] More Exotic Excel Files Dropping AgentTesla - published about 1 year ago. Content: Today, I published the following diary on isc.sans.edu: “More Exotic Excel Files Dropping AgentTesla”: Excel is an excellent target for attackers. The Microsoft Office suite is installed on millions of computers, and people trust these files. If we have the classic xls, xls, xlsm file extensions, Excel supports many others! Just check your local registry... https://blog.rootshell.be/2023/08/23/sans-isc-more-exotic-excel-files-dropping-agenttesla/ Published: 2023 08 23 07:27:01 Received: 2023 08 26 11:40:19 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: [SANS ISC] macOS: Who’s Behind This Network Connection? - published about 1 year ago. Content: Today, I published the following diary on isc.sans.edu: “macOS: Who’s Behind This Network Connection?“: When you must investigate suspicious behavior or work on an actual incident, you could be asked to determine who’s behind a network connection. From a pure network point of view, your firewall or any network security control device/app will tell you th... https://blog.rootshell.be/2023/08/26/sans-isc-macos-whos-behind-this-network-connection/ Published: 2023 08 26 10:59:53 Received: 2023 08 26 11:40:18 Feed: /dev/random Source: /dev/random Category: Cyber Security Topic: Cyber Security |
|
Article: macOS: Who?s Behind This Network Connection?, (Sat, Aug 26th) - published about 1 year ago. Content: When you must investigate suspicious behavior or work on an actual incident, you could be asked to determine who’s behind a network connection. From a pure network point of view, your firewall or any network security control device/app will tell you that the source is the connection is host « A », « B » or « C ». But investigating further how to discover who... https://isc.sans.edu/diary/rss/30160 Published: 2023 08 26 10:55:40 Received: 2023 08 26 11:34:31 Feed: SANS Internet Storm Center, InfoCON: green Source: SANS Internet Storm Center, InfoCON: green Category: Alerts Topic: Vulnerabilities |
Article: CVE-2020-19909 is everything that is wrong with CVEs - published about 1 year ago. Content: submitted by /u/DeathLeopard [link] [comments]... https://www.reddit.com/r/netsec/comments/161sail/cve202019909_is_everything_that_is_wrong_with_cves/ Published: 2023 08 26 11:07:53 Received: 2023 08 26 11:22:47 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
|
Article: edX: Try It: Cybersecurity Basics - published about 1 year ago. Content: Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without ... https://www.edx.org/learn/engineering/edx-try-it-cybersecurity-basics Published: 2023 08 26 08:23:55 Received: 2023 08 26 11:22:34 Feed: Google Alert – cybersecurity Source: Google Alert Category: News Topic: Cyber Security |
|
Article: LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants - published about 1 year ago. Content: https://thehackernews.com/2023/08/lockbit-30-ransomware-builder-leak.html Published: 2023 08 26 10:26:00 Received: 2023 08 26 11:03:13 Feed: The Hacker News Source: The Hacker News Category: News Topic: Cyber Security |
Article: Threat Hunting Newsletter - Excel for Threat Hunters - published about 1 year ago. Content: I wrote a newsletter on how to use Excel to hunt your data for threats. submitted by /u/m_edmondson [link] [comments]... https://www.reddit.com/r/netsec/comments/161ry2h/threat_hunting_newsletter_excel_for_threat_hunters/ Published: 2023 08 26 10:50:04 Received: 2023 08 26 11:03:02 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
|
Article: How Cross-Site Frame Counting Exposes Private Repositories on GitHub - published about 1 year ago. Content: submitted by /u/AnonVersal [link] [comments]... https://www.reddit.com/r/netsec/comments/161s1m1/how_crosssite_frame_counting_exposes_private/ Published: 2023 08 26 10:55:07 Received: 2023 08 26 11:03:02 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
|
Article: LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants - published about 1 year ago. Content: https://thehackernews.com/2023/08/lockbit-30-ransomware-builder-leak.html Published: 2023 08 26 10:26:00 Received: 2023 08 26 11:02:07 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
Click to Open Code Editor