All Articles

Ordered by Date Received : Year: "2024" Month: "03" Day: "13" Hour: "18"
Page: 1 (of 0)

Total Articles in this collection: 43

Navigation Help at the bottom of the page
Article: DevOps at Nationalgrid ESO - the Balancing Mechanism revolution - Computing UK - published about 2 months ago.
Content: Sam Rowell is product owner - Open Balancing Platform - Platform & DevSecOps at IBM. Sam is a DevOps Evangelist with 8 years' experience of DevOps ...
https://www.computing.co.uk/sponsored/4185087/devops-nationalgrid-eso-balancing-mechanism-revolution   
Published: 2024 03 13 15:44:47
Received: 2024 03 13 18:46:25
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevOps at Nationalgrid ESO - the Balancing Mechanism revolution - Computing UK - published about 2 months ago.
Content: Sam Rowell is product owner - Open Balancing Platform - Platform & DevSecOps at IBM. Sam is a DevOps Evangelist with 8 years' experience of DevOps ...
https://www.computing.co.uk/sponsored/4185087/devops-nationalgrid-eso-balancing-mechanism-revolution   
Published: 2024 03 13 15:44:47
Received: 2024 03 13 18:46:25
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Вебинар “Управление метриками информационной безопасности” - cisoclub - published about 2 months ago.
Content: Вебинар “Сила трёх: DevSecOps. Комплексная защита приложений от разработки до продакшена”. 13.03.2024. UserGate ТехТур ...
https://cisoclub.ru/vebinar-upravlenie-metrikami-informacionnoj-bezopasnosti/   
Published: 2024 03 13 16:41:05
Received: 2024 03 13 18:46:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Вебинар “Управление метриками информационной безопасности” - cisoclub - published about 2 months ago.
Content: Вебинар “Сила трёх: DevSecOps. Комплексная защита приложений от разработки до продакшена”. 13.03.2024. UserGate ТехТур ...
https://cisoclub.ru/vebinar-upravlenie-metrikami-informacionnoj-bezopasnosti/   
Published: 2024 03 13 16:41:05
Received: 2024 03 13 18:46:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Codezero: Enterprise Microservices Development Company Raises $3.5 Million - Pulse 2.0 - published about 2 months ago.
Content: This move is also strategic for the company's impact on enterprise DevOps and DevSecOps organizations, cloud-service providers, and cloud migration ...
https://pulse2.com/codezero-3-5-million-funding/   
Published: 2024 03 13 18:09:16
Received: 2024 03 13 18:46:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Codezero: Enterprise Microservices Development Company Raises $3.5 Million - Pulse 2.0 - published about 2 months ago.
Content: This move is also strategic for the company's impact on enterprise DevOps and DevSecOps organizations, cloud-service providers, and cloud migration ...
https://pulse2.com/codezero-3-5-million-funding/   
Published: 2024 03 13 18:09:16
Received: 2024 03 13 18:46:24
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Meta Adds Messaging Interoperability For Whatsapp, Messenger - published about 2 months ago.
Content:
https://www.silicon.co.uk/mobility/mobile-apps/meta-adds-messaging-interoperability-for-whatsapp-messenger-554502   
Published: 2024 03 13 18:26:51
Received: 2024 03 13 18:44:10
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Meta Adds Messaging Interoperability For Whatsapp, Messenger - published about 2 months ago.
Content:
https://www.silicon.co.uk/mobility/mobile-apps/meta-adds-messaging-interoperability-for-whatsapp-messenger-554502   
Published: 2024 03 13 18:26:51
Received: 2024 03 13 18:44:10
Feed: Silicon UK – Security
Source: Silicon UK
Category: News
Topic: Cyber Security
Article: Join us for EFF's 8th Annual Tech Trivia Night! - published 2 months ago.
Content:
https://www.eff.org/deeplinks/2024/03/join-us-effs-8th-annual-tech-trivia-night   
Published: 2024 03 08 20:56:04
Received: 2024 03 13 18:43:54
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: Join us for EFF's 8th Annual Tech Trivia Night! - published 2 months ago.
Content:
https://www.eff.org/deeplinks/2024/03/join-us-effs-8th-annual-tech-trivia-night   
Published: 2024 03 08 20:56:04
Received: 2024 03 13 18:43:54
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Protect Yourself from Election Misinformation - published about 2 months ago.
Content:
https://www.eff.org/deeplinks/2024/03/protect-yourself-election-misinformation   
Published: 2024 03 13 18:22:26
Received: 2024 03 13 18:43:51
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Article: Protect Yourself from Election Misinformation - published about 2 months ago.
Content:
https://www.eff.org/deeplinks/2024/03/protect-yourself-election-misinformation   
Published: 2024 03 13 18:22:26
Received: 2024 03 13 18:43:51
Feed: Deeplinks
Source: Deeplinks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Three quarters of cybersecurity breaches are down to human error - Workplace Insight - published about 2 months ago.
Content: A new poll from Mimecast claims that 74 percent of all cybersecurity breaches in the workplace are caused by human factors.
https://workplaceinsight.net/three-quarters-of-cybersecurity-breaches-are-down-to-human-error/   
Published: 2024 03 13 14:35:28
Received: 2024 03 13 18:43:16
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Three quarters of cybersecurity breaches are down to human error - Workplace Insight - published about 2 months ago.
Content: A new poll from Mimecast claims that 74 percent of all cybersecurity breaches in the workplace are caused by human factors.
https://workplaceinsight.net/three-quarters-of-cybersecurity-breaches-are-down-to-human-error/   
Published: 2024 03 13 14:35:28
Received: 2024 03 13 18:43:16
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Heimdal® Celebrates 10 Years of Cybersecurity Excellence - PR Newswire UK - published about 2 months ago.
Content: PRNewswire/ -- Heimdal®, a leader in innovative cybersecurity solutions, is proud to announce the celebration of its 10-year anniversary.
https://www.prnewswire.co.uk/news-releases/heimdal-celebrates-10-years-of-cybersecurity-excellence-302087934.html   
Published: 2024 03 13 16:17:25
Received: 2024 03 13 18:43:12
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Heimdal® Celebrates 10 Years of Cybersecurity Excellence - PR Newswire UK - published about 2 months ago.
Content: PRNewswire/ -- Heimdal®, a leader in innovative cybersecurity solutions, is proud to announce the celebration of its 10-year anniversary.
https://www.prnewswire.co.uk/news-releases/heimdal-celebrates-10-years-of-cybersecurity-excellence-302087934.html   
Published: 2024 03 13 16:17:25
Received: 2024 03 13 18:43:12
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: HHS opens probe into UnitedHealth's cybersecurity as hack fallout continues - published about 2 months ago.
Content: The Biden administration is opening an investigation into UnitedHealth Group following a cyberattack on a subsidiary that has crippled health-care ...
https://www.washingtonpost.com/health/2024/03/13/patient-data-breach-hhs-probe-unitedhealth-change-healthcare/   
Published: 2024 03 13 17:14:43
Received: 2024 03 13 18:43:12
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: HHS opens probe into UnitedHealth's cybersecurity as hack fallout continues - published about 2 months ago.
Content: The Biden administration is opening an investigation into UnitedHealth Group following a cyberattack on a subsidiary that has crippled health-care ...
https://www.washingtonpost.com/health/2024/03/13/patient-data-breach-hhs-probe-unitedhealth-change-healthcare/   
Published: 2024 03 13 17:14:43
Received: 2024 03 13 18:43:12
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: M3 MacBook Air Teardown Shows Apple Fixed Base Model's Biggest Flaw - published about 2 months ago.
Content:
https://www.macrumors.com/2024/03/13/m3-macbook-air-ifixit-teardown/   
Published: 2024 03 13 18:11:51
Received: 2024 03 13 18:25:29
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: M3 MacBook Air Teardown Shows Apple Fixed Base Model's Biggest Flaw - published about 2 months ago.
Content:
https://www.macrumors.com/2024/03/13/m3-macbook-air-ifixit-teardown/   
Published: 2024 03 13 18:11:51
Received: 2024 03 13 18:25:29
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: PixPirate Android malware uses new tactic to hide on phones - published about 2 months ago.
Content:
https://www.bleepingcomputer.com/news/security/pixpirate-android-malware-uses-new-tactic-to-hide-on-phones/   
Published: 2024 03 13 18:13:05
Received: 2024 03 13 18:24:45
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: PixPirate Android malware uses new tactic to hide on phones - published about 2 months ago.
Content:
https://www.bleepingcomputer.com/news/security/pixpirate-android-malware-uses-new-tactic-to-hide-on-phones/   
Published: 2024 03 13 18:13:05
Received: 2024 03 13 18:24:45
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Poking holes in Google tech bagged bug hunters $10M - published about 2 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/03/13/google_2023_bug_bounties/   
Published: 2024 03 13 18:00:14
Received: 2024 03 13 18:23:36
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Article: Poking holes in Google tech bagged bug hunters $10M - published about 2 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/03/13/google_2023_bug_bounties/   
Published: 2024 03 13 18:00:14
Received: 2024 03 13 18:23:36
Feed: The Register - Security
Source: The Register
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Infosys hiring DevSecOps - EQS Consultant Job in Calgary | Glassdoor - published about 2 months ago.
Content: Infosys is seeking a DevSecOps Consultant. This position will interface with key stakeholders and apply technical profic.
https://www.glassdoor.ca/job-listing/devsecops-eqs-consultant-infosys-JV_IC2275123_KO0,24_KE25,32.htm?jl=1009157378588   
Published: 2024 03 13 13:21:03
Received: 2024 03 13 18:06:03
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Infosys hiring DevSecOps - EQS Consultant Job in Calgary | Glassdoor - published about 2 months ago.
Content: Infosys is seeking a DevSecOps Consultant. This position will interface with key stakeholders and apply technical profic.
https://www.glassdoor.ca/job-listing/devsecops-eqs-consultant-infosys-JV_IC2275123_KO0,24_KE25,32.htm?jl=1009157378588   
Published: 2024 03 13 13:21:03
Received: 2024 03 13 18:06:03
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer - Concept Plus Careers - Jobvite - published about 2 months ago.
Content: Description. Configuration Manager. Participate on a Scrum Team that is modernizing a legacy application. Provision and maintain DevSecOps ...
https://jobs.jobvite.com/conceptplusllc/job/o8z4rfwW   
Published: 2024 03 13 15:34:36
Received: 2024 03 13 18:06:02
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer - Concept Plus Careers - Jobvite - published about 2 months ago.
Content: Description. Configuration Manager. Participate on a Scrum Team that is modernizing a legacy application. Provision and maintain DevSecOps ...
https://jobs.jobvite.com/conceptplusllc/job/o8z4rfwW   
Published: 2024 03 13 15:34:36
Received: 2024 03 13 18:06:02
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: The ‘Emergency Powers’ Risk of a Second Trump Presidency - published about 2 months ago.
Content:
https://www.wired.com/story/donald-trump-emergency-powers/   
Published: 2024 03 13 17:42:05
Received: 2024 03 13 18:03:23
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Article: The ‘Emergency Powers’ Risk of a Second Trump Presidency - published about 2 months ago.
Content:
https://www.wired.com/story/donald-trump-emergency-powers/   
Published: 2024 03 13 17:42:05
Received: 2024 03 13 18:03:23
Feed: Wired.com – Security Feed
Source: Wired
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: British Library shares lessons from cyber attack - UKAuthority - published about 2 months ago.
Content: ... cyber security in the technology rebuild and processes, and a shift away from on-site to cloud based systems. Lingering disruption. According to ...
https://www.ukauthority.com/articles/british-library-shares-lessons-from-cyber-attack/   
Published: 2024 03 13 12:16:45
Received: 2024 03 13 18:03:21
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: British Library shares lessons from cyber attack - UKAuthority - published about 2 months ago.
Content: ... cyber security in the technology rebuild and processes, and a shift away from on-site to cloud based systems. Lingering disruption. According to ...
https://www.ukauthority.com/articles/british-library-shares-lessons-from-cyber-attack/   
Published: 2024 03 13 12:16:45
Received: 2024 03 13 18:03:21
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Poking holes in Google tech bagged bug hunters $10M - published about 2 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/03/13/google_2023_bug_bounties/   
Published: 2024 03 13 18:00:14
Received: 2024 03 13 18:03:09
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Poking holes in Google tech bagged bug hunters $10M - published about 2 months ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2024/03/13/google_2023_bug_bounties/   
Published: 2024 03 13 18:00:14
Received: 2024 03 13 18:03:09
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Leak of Acer Philippines employee database appears on hacking forum - published about 2 months ago.
Content:
https://www.bitdefender.com/blog/hotforsecurity/leak-of-acer-philippines-employee-database-appears-on-hacking-forum/   
Published: 2024 03 13 17:38:22
Received: 2024 03 13 18:00:35
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Article: Leak of Acer Philippines employee database appears on hacking forum - published about 2 months ago.
Content:
https://www.bitdefender.com/blog/hotforsecurity/leak-of-acer-philippines-employee-database-appears-on-hacking-forum/   
Published: 2024 03 13 17:38:22
Received: 2024 03 13 18:00:35
Feed: Graham Cluley
Source: Graham Cluley
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: ShellShock payload sample Linux.Bashlet - published over 9 years ago.
Content: Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here: MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun... Download Download. Email me if you need the password File Information File: fu4k_2485040231A35B7A465361FAF92A512D Size:...
https://contagiodump.blogspot.com/2014/10/shellshock-payload-sample-linuxbashlet.html   
Published: 2014 10 02 12:12:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: ShellShock payload sample Linux.Bashlet - published over 9 years ago.
Content: Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here: MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun... Download Download. Email me if you need the password File Information File: fu4k_2485040231A35B7A465361FAF92A512D Size:...
https://contagiodump.blogspot.com/2014/10/shellshock-payload-sample-linuxbashlet.html   
Published: 2014 10 02 12:12:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples - published over 9 years ago.
Content: PART II Wirelurker for Windows (WinLurker) Research: Palo Alto Claud Xiao: Wirelurker for Windows Sample credit: Claud Xiao PART I Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X MalwarePalo Alto |Claud Xiao - blog post WirelurkerWirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetector Sample credit: Clau...
https://contagiodump.blogspot.com/2014/11/wirelurker-for-osx-ios-part-i-and.html   
Published: 2014 11 07 01:57:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples - published over 9 years ago.
Content: PART II Wirelurker for Windows (WinLurker) Research: Palo Alto Claud Xiao: Wirelurker for Windows Sample credit: Claud Xiao PART I Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X MalwarePalo Alto |Claud Xiao - blog post WirelurkerWirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetector Sample credit: Clau...
https://contagiodump.blogspot.com/2014/11/wirelurker-for-osx-ios-part-i-and.html   
Published: 2014 11 07 01:57:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: OnionDuke samples - published over 9 years ago.
Content: Research:  F-Secure: OnionDuke: APT Attacks Via the Tor Network Download Download. Email me if you need the password (new link) File attributes Size: 219136 MD5:  28F96A57FA5FF663926E9BAD51A1D0CB Size: 126464 MD5:  C8EB6040FD02D77660D19057A38FF769 Size: 316928 MD5:  D1CE79089578DA2D41F1AD901F7B1014 Vir...
https://contagiodump.blogspot.com/2014/11/onionduke-samples.html   
Published: 2014 11 16 03:58:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: OnionDuke samples - published over 9 years ago.
Content: Research:  F-Secure: OnionDuke: APT Attacks Via the Tor Network Download Download. Email me if you need the password (new link) File attributes Size: 219136 MD5:  28F96A57FA5FF663926E9BAD51A1D0CB Size: 126464 MD5:  C8EB6040FD02D77660D19057A38FF769 Size: 316928 MD5:  D1CE79089578DA2D41F1AD901F7B1014 Vir...
https://contagiodump.blogspot.com/2014/11/onionduke-samples.html   
Published: 2014 11 16 03:58:00
Received: 2024 03 13 18:00:20
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: AlienSpy Java RAT samples and traffic information - published over 9 years ago.
Content: AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014. It appears to be used in the same campaigns as was Unrccom/Adwind - see the references. If C2 responds, the java RAT downloads Jar files containing Windows Pony/Ponik loader. The RAT is crossplatform and ...
https://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html   
Published: 2014 11 17 21:16:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: AlienSpy Java RAT samples and traffic information - published over 9 years ago.
Content: AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014. It appears to be used in the same campaigns as was Unrccom/Adwind - see the references. If C2 responds, the java RAT downloads Jar files containing Windows Pony/Ponik loader. The RAT is crossplatform and ...
https://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html   
Published: 2014 11 17 21:16:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Video archives of security conferences and workshops - published over 9 years ago.
Content: Just some links for your enjoyment List of security conferences in 2014 Video archives: AIDE (Appalachian Institute of Digital Evidence) 2013 2012 2011 Blackhat 2012 or 2012 torrent Botconf 2013 Bsides BSides DC 2014 BSides Chicago 2014 BSides Nashville 2014 BSides Augusta 2014 BSides Huntsville 2014 BSides Las Vegas 2014 BSidesDE 2013 BSid...
https://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html   
Published: 2015 01 05 04:11:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Video archives of security conferences and workshops - published over 9 years ago.
Content: Just some links for your enjoyment List of security conferences in 2014 Video archives: AIDE (Appalachian Institute of Digital Evidence) 2013 2012 2011 Blackhat 2012 or 2012 torrent Botconf 2013 Bsides BSides DC 2014 BSides Chicago 2014 BSides Nashville 2014 BSides Augusta 2014 BSides Huntsville 2014 BSides Las Vegas 2014 BSidesDE 2013 BSid...
https://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html   
Published: 2015 01 05 04:11:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Ask and you shall receive - published about 9 years ago.
Content: I get emails from readers asking for specific malware samples and thought I would make a mini post about it. Yes, I often obtain samples from various sources for my own research.  I am sometimes too lazy/busy to post them but don't mind sharing. If you are looking for a particular sample, feel free to ask. I might have it. Send MD5 (several or few s...
https://contagiodump.blogspot.com/2015/03/ask-and-you-shall-receive.html   
Published: 2015 03 09 01:08:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ask and you shall receive - published about 9 years ago.
Content: I get emails from readers asking for specific malware samples and thought I would make a mini post about it. Yes, I often obtain samples from various sources for my own research.  I am sometimes too lazy/busy to post them but don't mind sharing. If you are looking for a particular sample, feel free to ask. I might have it. Send MD5 (several or few s...
https://contagiodump.blogspot.com/2015/03/ask-and-you-shall-receive.html   
Published: 2015 03 09 01:08:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: An Overview of Exploit Packs (Update 25) May 2015 - published about 9 years ago.
Content: Update May 12, 2015 Added CVE-2015-0359 and updates for CVE-2015-0336  Exploit kit table 2014- 2015 (Sortable HTML table) Reference table : Exploit References 2014-2015 Update March 20, 2015 Added CVE-2015-0336 ------------------------ Update February 19, 2015 Added Hanjuan Exploit kit and CVE-2015-3013 for Angler  Update...
https://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html   
Published: 2015 05 12 04:30:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: An Overview of Exploit Packs (Update 25) May 2015 - published about 9 years ago.
Content: Update May 12, 2015 Added CVE-2015-0359 and updates for CVE-2015-0336  Exploit kit table 2014- 2015 (Sortable HTML table) Reference table : Exploit References 2014-2015 Update March 20, 2015 Added CVE-2015-0336 ------------------------ Update February 19, 2015 Added Hanjuan Exploit kit and CVE-2015-3013 for Angler  Update...
https://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html   
Published: 2015 05 12 04:30:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Potao Express samples - published over 8 years ago.
Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/ http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdf TL; DR 2011- July 2015 Aka  Sapotao and node69 Group - Sandworm / Quedagh APT Vectors - USB, exe as doc, xls Victims - RU, BY, AM, GE  Victims - MMM group, UA gov truecryptrussia.ru has be...
https://contagiodump.blogspot.com/2015/08/potao-express-samples.html   
Published: 2015 08 12 12:24:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Potao Express samples - published over 8 years ago.
Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/ http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdf TL; DR 2011- July 2015 Aka  Sapotao and node69 Group - Sandworm / Quedagh APT Vectors - USB, exe as doc, xls Victims - RU, BY, AM, GE  Victims - MMM group, UA gov truecryptrussia.ru has be...
https://contagiodump.blogspot.com/2015/08/potao-express-samples.html   
Published: 2015 08 12 12:24:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Files download information - published about 8 years ago.
Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account. It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with ...
https://contagiodump.blogspot.com/2016/02/files-download-information.html   
Published: 2016 02 23 20:48:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Files download information - published about 8 years ago.
Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account. It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with ...
https://contagiodump.blogspot.com/2016/02/files-download-information.html   
Published: 2016 02 23 20:48:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Ransomware.OSX.KeRanger samples - published about 8 years ago.
Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud Xiao Sample credit: Claud Xiao File information d1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1  1d6297e2427f1d00a5b355d6d50809cb  Transmission-2.90.dmg e3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574  56b1d956112b0b7...
https://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html   
Published: 2016 03 06 23:39:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ransomware.OSX.KeRanger samples - published about 8 years ago.
Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud Xiao Sample credit: Claud Xiao File information d1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1  1d6297e2427f1d00a5b355d6d50809cb  Transmission-2.90.dmg e3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574  56b1d956112b0b7...
https://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html   
Published: 2016 03 06 23:39:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: "i am lady" Linux.Lady trojan samples - published over 7 years ago.
Content: Bitcoin mining malware for Linux servers - samples Research: Dr. Web. Linux.Lady Sample Credit:  Tim Strazzere MD5 list: 0DE8BCA756744F7F2BDB732E3267C3F4 55952F4F41A184503C467141B6171BA7 86AC68E5B09D1C4B157193BB6CB34007 E2CACA9626ED93C3D137FDF494FDAE7C E9423E072AD5A31A80A31FC1F525D614 Download. Email me if you need the password. ...
https://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html   
Published: 2016 08 17 04:06:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: "i am lady" Linux.Lady trojan samples - published over 7 years ago.
Content: Bitcoin mining malware for Linux servers - samples Research: Dr. Web. Linux.Lady Sample Credit:  Tim Strazzere MD5 list: 0DE8BCA756744F7F2BDB732E3267C3F4 55952F4F41A184503C467141B6171BA7 86AC68E5B09D1C4B157193BB6CB34007 E2CACA9626ED93C3D137FDF494FDAE7C E9423E072AD5A31A80A31FC1F525D614 Download. Email me if you need the password. ...
https://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html   
Published: 2016 08 17 04:06:00
Received: 2024 03 13 18:00:19
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Linux.Agent malware sample - data stealer - published over 7 years ago.
Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight? Sample credit: Tim Strazzere List of files 9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65  malware d507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c  malware fddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c  script.decompiled-pretty ec5d4f90c912...
https://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html   
Published: 2016 08 24 04:18:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux.Agent malware sample - data stealer - published over 7 years ago.
Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight? Sample credit: Tim Strazzere List of files 9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65  malware d507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c  malware fddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c  script.decompiled-pretty ec5d4f90c912...
https://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html   
Published: 2016 08 24 04:18:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Part I. Russian APT - APT28 collection of samples including OSX XAgent - published about 7 years ago.
Content:  This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart's content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that "400 lb hacker" or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda. The post c...
https://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html   
Published: 2017 02 21 02:23:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part I. Russian APT - APT28 collection of samples including OSX XAgent - published about 7 years ago.
Content:  This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart's content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that "400 lb hacker" or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda. The post c...
https://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html   
Published: 2017 02 21 02:23:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DeepEnd Research: Analysis of Trump's secret server story - published about 7 years ago.
Content:  We posted our take on the Trump's server story. If you have any feedback or corrections, send me an email (see my blog profile on Contagio or DeepEnd Research) Analysis of Trump's secret server story... ...
https://contagiodump.blogspot.com/2017/03/deepend-research-analysis-of-trumps.html   
Published: 2017 03 20 04:28:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DeepEnd Research: Analysis of Trump's secret server story - published about 7 years ago.
Content:  We posted our take on the Trump's server story. If you have any feedback or corrections, send me an email (see my blog profile on Contagio or DeepEnd Research) Analysis of Trump's secret server story... ...
https://contagiodump.blogspot.com/2017/03/deepend-research-analysis-of-trumps.html   
Published: 2017 03 20 04:28:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Part II. APT29 Russian APT including Fancy Bear - published about 7 years ago.
Content: This is the second part of Russian APT series."APT29 - The Dukes Cozy Bear: APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008.1210 This group reportedly compromised the Democratic National Committee starting in the summer of 2015" (src.  Mitre ATT&CK) Please see the first post here: Russian ...
https://contagiodump.blogspot.com/2017/03/part-ii-apt29-russian-apt-including.html   
Published: 2017 03 31 06:02:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part II. APT29 Russian APT including Fancy Bear - published about 7 years ago.
Content: This is the second part of Russian APT series."APT29 - The Dukes Cozy Bear: APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008.1210 This group reportedly compromised the Democratic National Committee starting in the summer of 2015" (src.  Mitre ATT&CK) Please see the first post here: Russian ...
https://contagiodump.blogspot.com/2017/03/part-ii-apt29-russian-apt-including.html   
Published: 2017 03 31 06:02:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: DDE Command Execution malware samples - published over 6 years ago.
Content: Here are a few samples related to the recent DDE Command execution DDE Macro-less Command Execution Vulnerability Download. Email me if you need the password  (updated sample pack)Links updated: Jan 20, 2023 References Reading:10/18/2017 InQuest/yara-rules 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inq...
https://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html   
Published: 2017 10 18 06:24:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DDE Command Execution malware samples - published over 6 years ago.
Content: Here are a few samples related to the recent DDE Command execution DDE Macro-less Command Execution Vulnerability Download. Email me if you need the password  (updated sample pack)Links updated: Jan 20, 2023 References Reading:10/18/2017 InQuest/yara-rules 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inq...
https://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html   
Published: 2017 10 18 06:24:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published about 6 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems Research: Trend Micro There are two packages one is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package) Download Email me if you need the password     Links updated: Jan 19, 2023 File information Part one (full package) #File Name...
https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html   
Published: 2018 03 20 13:23:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published about 6 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems Research: Trend Micro There are two packages one is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package) Download Email me if you need the password     Links updated: Jan 19, 2023 File information Part one (full package) #File Name...
https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html   
Published: 2018 03 20 13:23:00
Received: 2024 03 13 18:00:18
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: HiddenWasp Linux malware backdoor samples - published almost 5 years ago.
Content: Intezer HiddenWasp Malware Stings Targeted Linux Systems Download. Email me if you need the password (see in my profile) Malware Inventory (work in progress) Links updated: Jan 19, 2023 File informatio 8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b 8f1c51c4963c0bad6cf04444feb411d7  shell f321685342fa373c33eb9479176a086a1c56c90a1826a...
https://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html   
Published: 2019 06 04 04:31:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: HiddenWasp Linux malware backdoor samples - published almost 5 years ago.
Content: Intezer HiddenWasp Malware Stings Targeted Linux Systems Download. Email me if you need the password (see in my profile) Malware Inventory (work in progress) Links updated: Jan 19, 2023 File informatio 8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b 8f1c51c4963c0bad6cf04444feb411d7  shell f321685342fa373c33eb9479176a086a1c56c90a1826a...
https://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html   
Published: 2019 06 04 04:31:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Linux/AirDropBot samples - published over 4 years ago.
Content: Malware Must Die:  MMD-0064-2019 - Linux/AirDropBot Mirai variant targeting Linksys E-series - Remote Code Execution tmUnblock.cgi  Download. Email me if you need the password (see in my profile)  Malware Inventory (work in progress)Links updated: Jan 19, 2023 Hashes MD5 SHA256 SHA1 85a8aad8d938c44c3f3f51089a60ec16 1a75...
https://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html   
Published: 2019 10 06 20:37:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux/AirDropBot samples - published over 4 years ago.
Content: Malware Must Die:  MMD-0064-2019 - Linux/AirDropBot Mirai variant targeting Linksys E-series - Remote Code Execution tmUnblock.cgi  Download. Email me if you need the password (see in my profile)  Malware Inventory (work in progress)Links updated: Jan 19, 2023 Hashes MD5 SHA256 SHA1 85a8aad8d938c44c3f3f51089a60ec16 1a75...
https://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html   
Published: 2019 10 06 20:37:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published over 4 years ago.
Content: Amnesia / Radiation botnet samples  Remote Code Execution in CCTV DVR (kerneronsec.com - 2016) 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet 2016-08-11 CyberX Radiation IoT Cybersecurity campaign Download. Email me if you need the password (see in my profile)  Malware Inventory (work in progress) Links updated: Jan ...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html   
Published: 2019 10 06 21:16:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published over 4 years ago.
Content: Amnesia / Radiation botnet samples  Remote Code Execution in CCTV DVR (kerneronsec.com - 2016) 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet 2016-08-11 CyberX Radiation IoT Cybersecurity campaign Download. Email me if you need the password (see in my profile)  Malware Inventory (work in progress) Links updated: Jan ...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html   
Published: 2019 10 06 21:16:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published over 4 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram  “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own. It is written using Autoit scripts and then compiled into a Windows executable. It uses Telegram to exfiltrate stolen information.Downl...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html   
Published: 2019 10 07 03:48:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published over 4 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram  “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own. It is written using Autoit scripts and then compiled into a Windows executable. It uses Telegram to exfiltrate stolen information.Downl...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html   
Published: 2019 10 07 03:48:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: APT Calypso RAT, Flying Dutchman Samples - published over 4 years ago.
Content: 2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.   Download. Email me if you need the passw...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html   
Published: 2019 12 02 04:46:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: APT Calypso RAT, Flying Dutchman Samples - published over 4 years ago.
Content: 2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.   Download. Email me if you need the passw...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html   
Published: 2019 12 02 04:46:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: KPOT info stealer samples - published about 4 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)Download 1  (from Didier Stevens' post)Download 2  (Proofpoint)Malware Inventory (work in progress)Links updated: Jan 19, 2023 References ...
https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html   
Published: 2020 04 19 15:27:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: KPOT info stealer samples - published about 4 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)Download 1  (from Didier Stevens' post)Download 2  (Proofpoint)Malware Inventory (work in progress)Links updated: Jan 19, 2023 References ...
https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html   
Published: 2020 04 19 15:27:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published over 3 years ago.
Content: 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorThe Resurgence of Russian Threat Actor, NOBELIUMDownload (627.7 MB). Email me if you need the password (see in my profile)           Malware Inventory (work in progress)ReferenceI am sure you all saw the news. Links update...
https://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html   
Published: 2020 12 14 14:47:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published over 3 years ago.
Content: 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorThe Resurgence of Russian Threat Actor, NOBELIUMDownload (627.7 MB). Email me if you need the password (see in my profile)           Malware Inventory (work in progress)ReferenceI am sure you all saw the news. Links update...
https://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html   
Published: 2020 12 14 14:47:00
Received: 2024 03 13 18:00:17
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Malware Arsenal used by Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) in attacks targeting Ukraine (samples) - published about 1 year ago.
Content:  2023-02-18Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) is an Advanced Persistent Threat (APT) group believed to be based in Russia. Their primary targets have been diplomatic and government entities in Europe, particularly Ukraine, and the United States. They have also targeted ...
https://contagiodump.blogspot.com/2023/02/malware-arsenal-used-by-ember-bear-aka.html   
Published: 2023 02 18 07:59:00
Received: 2024 03 13 18:00:16
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Malware Arsenal used by Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) in attacks targeting Ukraine (samples) - published about 1 year ago.
Content:  2023-02-18Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) is an Advanced Persistent Threat (APT) group believed to be based in Russia. Their primary targets have been diplomatic and government entities in Europe, particularly Ukraine, and the United States. They have also targeted ...
https://contagiodump.blogspot.com/2023/02/malware-arsenal-used-by-ember-bear-aka.html   
Published: 2023 02 18 07:59:00
Received: 2024 03 13 18:00:16
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security

All Articles

Ordered by Date Received : Year: "2024" Month: "03" Day: "13" Hour: "18"
Page: 1 (of 0)

Total Articles in this collection: 43


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor