All Articles

Ordered by Date Received : Year: "2023"
Page: << < 2,481 (of 2,611) > >>

Total Articles in this collection: 130,572

Navigation Help at the bottom of the page
Article: IOTW: Mailchimp suffers another social engineering attack - Cyber Security Hub - published about 2 years ago.
Content: Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and ...
https://www.cshub.com/attacks/news/iotw-mailchimp-suffers-another-social-engineering-attack   
Published: 2023 01 20 05:07:33
Received: 2023 01 20 09:03:28
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: IOTW: Mailchimp suffers another social engineering attack - Cyber Security Hub - published about 2 years ago.
Content: Reach Cyber Security professionals through cost-effective marketing opportunities to deliver your message, position yourself as a thought leader, and ...
https://www.cshub.com/attacks/news/iotw-mailchimp-suffers-another-social-engineering-attack   
Published: 2023 01 20 05:07:33
Received: 2023 01 20 09:03:28
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity company SentinelOne opens regional office in Dubai - Arabian Business - published about 2 years ago.
Content: SentinelOne plans to serve its partners and customers in the Middle East, Turkey and Africa through the new regional hub Cybersecurity company ...
https://www.arabianbusiness.com/industries/technology/cybersecurity-company-sentinelone-opens-regional-office-in-dubai   
Published: 2023 01 20 07:40:20
Received: 2023 01 20 09:03:26
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity company SentinelOne opens regional office in Dubai - Arabian Business - published about 2 years ago.
Content: SentinelOne plans to serve its partners and customers in the Middle East, Turkey and Africa through the new regional hub Cybersecurity company ...
https://www.arabianbusiness.com/industries/technology/cybersecurity-company-sentinelone-opens-regional-office-in-dubai   
Published: 2023 01 20 07:40:20
Received: 2023 01 20 09:03:26
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware - published about 2 years ago.
Content:
https://thehackernews.com/2023/01/new-chinese-malware-spotted-exploiting.html   
Published: 2023 01 20 06:59:00
Received: 2023 01 20 09:02:04
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Chinese Hackers Exploited Recent Fortinet Flaw as 0-Day to Drop Malware - published about 2 years ago.
Content:
https://thehackernews.com/2023/01/new-chinese-malware-spotted-exploiting.html   
Published: 2023 01 20 06:59:00
Received: 2023 01 20 09:02:04
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Phishing and ransomware amongst biggest threats to charity sector - published about 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/phishing-and-ransomware-amongst-biggest-threats-to-charity-sector   
Published: 2023 01 20 00:00:00
Received: 2023 01 20 08:41:01
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Phishing and ransomware amongst biggest threats to charity sector - published about 2 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/phishing-and-ransomware-amongst-biggest-threats-to-charity-sector   
Published: 2023 01 20 00:00:00
Received: 2023 01 20 08:41:01
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: Positive Technologies и Swordfish Security сообщают о партнерстве в сфере application security - published about 2 years ago.
Content: Одна из целей партнерства — создать лучшие практики DevSecOps, которые позволят отечественным компаниям не только выявлять бреши в программном ...
https://smart-lab.ru/blog/871610.php   
Published: 2023 01 19 14:54:37
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Positive Technologies и Swordfish Security сообщают о партнерстве в сфере application security - published about 2 years ago.
Content: Одна из целей партнерства — создать лучшие практики DevSecOps, которые позволят отечественным компаниям не только выявлять бреши в программном ...
https://smart-lab.ru/blog/871610.php   
Published: 2023 01 19 14:54:37
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Arrow et Synopsys signent un accord de distribution paneuropéen - Global Security Mag - published about 2 years ago.
Content: Arrow revendra et fournira les solutions et services de Synopsys, les intégrera dans les flux de travail DevSecOps et contribuera à garantir une ...
https://www.globalsecuritymag.fr/Arrow-et-Synopsys-signent-un-accord-de-distribution-paneuropeen.html   
Published: 2023 01 19 21:36:46
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Arrow et Synopsys signent un accord de distribution paneuropéen - Global Security Mag - published about 2 years ago.
Content: Arrow revendra et fournira les solutions et services de Synopsys, les intégrera dans les flux de travail DevSecOps et contribuera à garantir une ...
https://www.globalsecuritymag.fr/Arrow-et-Synopsys-signent-un-accord-de-distribution-paneuropeen.html   
Published: 2023 01 19 21:36:46
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Healthcare Cyberattacks: 5 Factors For Staying Safe In 2023 - Forbes - published about 2 years ago.
Content: Meredith is the CEO of AutoRABIT, a leader in DevSecOps and data protection for regulated industries. Silhouette of male hand typing on laptop ...
https://www.forbes.com/sites/forbestechcouncil/2023/01/19/healthcare-cyberattacks-5-factors-for-staying-safe-in-2023/   
Published: 2023 01 19 22:33:25
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Healthcare Cyberattacks: 5 Factors For Staying Safe In 2023 - Forbes - published about 2 years ago.
Content: Meredith is the CEO of AutoRABIT, a leader in DevSecOps and data protection for regulated industries. Silhouette of male hand typing on laptop ...
https://www.forbes.com/sites/forbestechcouncil/2023/01/19/healthcare-cyberattacks-5-factors-for-staying-safe-in-2023/   
Published: 2023 01 19 22:33:25
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Progress przejmuje za 355 mln dol. - CRN - published about 2 years ago.
Content: Ponad połowa firm IT nie rozumie, jakie znaczenie ma ochrona danych w działaniach DevSecOps. Autor: Krzysztof Pasławski | Dodano: 2023-01-10 11:55 ...
https://crn.pl/aktualnosci/progress-przejmuje-za-355-mln-dol/   
Published: 2023 01 19 22:43:59
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Progress przejmuje za 355 mln dol. - CRN - published about 2 years ago.
Content: Ponad połowa firm IT nie rozumie, jakie znaczenie ma ochrona danych w działaniach DevSecOps. Autor: Krzysztof Pasławski | Dodano: 2023-01-10 11:55 ...
https://crn.pl/aktualnosci/progress-przejmuje-za-355-mln-dol/   
Published: 2023 01 19 22:43:59
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Ransomware attacks remain the most acute threat to organisations - published about 2 years ago.
Content: DevSecOps is an important strategy that includes automated security at every phase of software development. It includes making application and ...
https://www.openaccessgovernment.org/ransomware-remains-cyber-crime-threat-organisations-uk/151635/   
Published: 2023 01 19 23:55:04
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Ransomware attacks remain the most acute threat to organisations - published about 2 years ago.
Content: DevSecOps is an important strategy that includes automated security at every phase of software development. It includes making application and ...
https://www.openaccessgovernment.org/ransomware-remains-cyber-crime-threat-organisations-uk/151635/   
Published: 2023 01 19 23:55:04
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Recomendaciones para implementar PlanSecOps | Seguridad Inteligente - published about 2 years ago.
Content: Estandarización de la ciberseguridad federal con DevSecOps · gestion de datos - mundo - tendencias Desafíos comunes de la migración de datos.
https://discoverthenew.ituser.es/seguridad-inteligente/2023/01/recomendaciones-para-implementar-plansecops   
Published: 2023 01 20 00:08:35
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Recomendaciones para implementar PlanSecOps | Seguridad Inteligente - published about 2 years ago.
Content: Estandarización de la ciberseguridad federal con DevSecOps · gestion de datos - mundo - tendencias Desafíos comunes de la migración de datos.
https://discoverthenew.ituser.es/seguridad-inteligente/2023/01/recomendaciones-para-implementar-plansecops   
Published: 2023 01 20 00:08:35
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: The Top 4 Threats to Securing Your Cloud Infrastructure - The New Stack - published about 2 years ago.
Content: DevOps may be happening, but DevSecOps often is not, which is hampering the industry's ability to make the cloud secure.
https://thenewstack.io/the-top-4-threats-to-securing-your-cloud-infrastructure/   
Published: 2023 01 20 00:51:17
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: The Top 4 Threats to Securing Your Cloud Infrastructure - The New Stack - published about 2 years ago.
Content: DevOps may be happening, but DevSecOps often is not, which is hampering the industry's ability to make the cloud secure.
https://thenewstack.io/the-top-4-threats-to-securing-your-cloud-infrastructure/   
Published: 2023 01 20 00:51:17
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: ThreatModeler First to Democratize DevSecOps with Launch of Threat Model Marketplace - published about 2 years ago.
Content: ThreatModeler First to Democratize DevSecOps with Launch of Threat Model Marketplace · Pre-built, vetted threat models are now available to kick-start ...
https://www.yahoo.com/now/threatmodeler-first-democratize-devsecops-launch-130003830.html   
Published: 2023 01 20 01:13:53
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: ThreatModeler First to Democratize DevSecOps with Launch of Threat Model Marketplace - published about 2 years ago.
Content: ThreatModeler First to Democratize DevSecOps with Launch of Threat Model Marketplace · Pre-built, vetted threat models are now available to kick-start ...
https://www.yahoo.com/now/threatmodeler-first-democratize-devsecops-launch-130003830.html   
Published: 2023 01 20 01:13:53
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Иранские гос.учреждения подверглись атаке усовершенствованного бэкдора - published about 2 years ago.
Content: Услуги ориентированы на крупных корпоративных клиентов, которые стремятся внедрить концепцию DevSecOps. «Партнерство со Swordfish Security в части ...
https://www.securitylab.ru/news/535869.php   
Published: 2023 01 20 01:44:14
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Иранские гос.учреждения подверглись атаке усовершенствованного бэкдора - published about 2 years ago.
Content: Услуги ориентированы на крупных корпоративных клиентов, которые стремятся внедрить концепцию DevSecOps. «Партнерство со Swordfish Security в части ...
https://www.securitylab.ru/news/535869.php   
Published: 2023 01 20 01:44:14
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Threat Model Marketplace aims to make DevSecOps more accessible | SC Media - published about 2 years ago.
Content: ThreatModeler launched the Threat Model Marketplace, a cybersecurity asset marketplace the will offer developers pre-built, field tested threat ...
https://www.scmagazine.com/news/cloud-security/threat-model-marketplace-aims-to-make-devsecops-more-accessible   
Published: 2023 01 20 04:00:59
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Threat Model Marketplace aims to make DevSecOps more accessible | SC Media - published about 2 years ago.
Content: ThreatModeler launched the Threat Model Marketplace, a cybersecurity asset marketplace the will offer developers pre-built, field tested threat ...
https://www.scmagazine.com/news/cloud-security/threat-model-marketplace-aims-to-make-devsecops-more-accessible   
Published: 2023 01 20 04:00:59
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: devsecops 시장 2022 비즈니스 전략, 예상 성장, 점유율, 상위 제조업체, 서비스, 산업 수직 및 ... - published about 2 years ago.
Content: devsecops 연구에서는 세계 경제에 중요한 것으로 보이는 부서의 광범위한 산업 하위 부문이 고려되었습니다. 또한 devsecops 업계 조사는 해외 회사에 영향 ...
https://www.asiatimeskorea.com/news/devsecops-%EC%8B%9C%EC%9E%A5-2022-%EB%B9%84%EC%A6%88%EB%8B%88%EC%8A%A4-%EC%A0%84%EB%9E%B5-%EC%98%88%EC%83%81-%EC%84%B1%EC%9E%A5-%EC%A0%90%EC%9C%A0%EC%9C%A8-%EC%83%81%EC%9C%84-%EC%A0%9C%EC%A1%B0/270934/   
Published: 2023 01 20 04:24:50
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: devsecops 시장 2022 비즈니스 전략, 예상 성장, 점유율, 상위 제조업체, 서비스, 산업 수직 및 ... - published about 2 years ago.
Content: devsecops 연구에서는 세계 경제에 중요한 것으로 보이는 부서의 광범위한 산업 하위 부문이 고려되었습니다. 또한 devsecops 업계 조사는 해외 회사에 영향 ...
https://www.asiatimeskorea.com/news/devsecops-%EC%8B%9C%EC%9E%A5-2022-%EB%B9%84%EC%A6%88%EB%8B%88%EC%8A%A4-%EC%A0%84%EB%9E%B5-%EC%98%88%EC%83%81-%EC%84%B1%EC%9E%A5-%EC%A0%90%EC%9C%A0%EC%9C%A8-%EC%83%81%EC%9C%84-%EC%A0%9C%EC%A1%B0/270934/   
Published: 2023 01 20 04:24:50
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: ThreatModeler Makes DevSecOps More Accessible With New Marketplace - published about 2 years ago.
Content: This new platform aims to make DevSecOps more accessible for businesses of all sizes. The marketplace includes pre-built threat models that can be ...
https://www.infosecurity-magazine.com/news/threatmodeler-makes-devsecops/   
Published: 2023 01 20 05:17:42
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: ThreatModeler Makes DevSecOps More Accessible With New Marketplace - published about 2 years ago.
Content: This new platform aims to make DevSecOps more accessible for businesses of all sizes. The marketplace includes pre-built threat models that can be ...
https://www.infosecurity-magazine.com/news/threatmodeler-makes-devsecops/   
Published: 2023 01 20 05:17:42
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: MoD plans Information Activities Programme for Army - UKAuthority - published about 2 years ago.
Content: ... saying it will need to provide a DevSecOps team to develop and maintain bespoke applications and integrate them with commercial off-the-shelf ...
https://www.ukauthority.com/articles/mod-plans-information-activities-programme-for-army/   
Published: 2023 01 20 06:08:11
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: MoD plans Information Activities Programme for Army - UKAuthority - published about 2 years ago.
Content: ... saying it will need to provide a DevSecOps team to develop and maintain bespoke applications and integrate them with commercial off-the-shelf ...
https://www.ukauthority.com/articles/mod-plans-information-activities-programme-for-army/   
Published: 2023 01 20 06:08:11
Received: 2023 01 20 08:28:34
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: DevSecOps 시장은 여전히 성장할 여지가 있습니다 | 떠오르는 플레이어 - 한국관광협회중앙회 - published about 2 years ago.
Content: DevSecOps 시장은 2022-2030년 예측 기간 동안 엄청난 성장을 목격하게 될 것입니다. 이 인텔리전스 보고서는 시장 규모, 점유율, 성장, 기회, 경쟁 환경, ...
https://www.koreatravel.or.kr/%EC%A0%84%EC%B2%B4%EB%89%B4%EC%8A%A4/devsecops-%EC%8B%9C%EC%9E%A5%EC%9D%80-%EC%97%AC%EC%A0%84%ED%9E%88-%EC%84%B1%EC%9E%A5%ED%95%A0-%EC%97%AC%EC%A7%80%EA%B0%80-%EC%9E%88%EC%8A%B5%EB%8B%88%EB%8B%A4-%EB%96%A0%EC%98%A4%EB%A5%B4%EB%8A%94/223101/   
Published: 2023 01 20 06:15:04
Received: 2023 01 20 08:28:33
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps 시장은 여전히 성장할 여지가 있습니다 | 떠오르는 플레이어 - 한국관광협회중앙회 - published about 2 years ago.
Content: DevSecOps 시장은 2022-2030년 예측 기간 동안 엄청난 성장을 목격하게 될 것입니다. 이 인텔리전스 보고서는 시장 규모, 점유율, 성장, 기회, 경쟁 환경, ...
https://www.koreatravel.or.kr/%EC%A0%84%EC%B2%B4%EB%89%B4%EC%8A%A4/devsecops-%EC%8B%9C%EC%9E%A5%EC%9D%80-%EC%97%AC%EC%A0%84%ED%9E%88-%EC%84%B1%EC%9E%A5%ED%95%A0-%EC%97%AC%EC%A7%80%EA%B0%80-%EC%9E%88%EC%8A%B5%EB%8B%88%EB%8B%A4-%EB%96%A0%EC%98%A4%EB%A5%B4%EB%8A%94/223101/   
Published: 2023 01 20 06:15:04
Received: 2023 01 20 08:28:33
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Why is Cybersecurity crucial to the Fintech sector? - Security Boulevard - published about 2 years ago.
Content: DevSecOps greatly facilitates a secure financial application's development. The key component of this idea is cybersecurity, coupled with other ...
https://securityboulevard.com/2023/01/why-is-cybersecurity-crucial-to-the-fintech-sector/   
Published: 2023 01 20 06:43:48
Received: 2023 01 20 08:28:33
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Why is Cybersecurity crucial to the Fintech sector? - Security Boulevard - published about 2 years ago.
Content: DevSecOps greatly facilitates a secure financial application's development. The key component of this idea is cybersecurity, coupled with other ...
https://securityboulevard.com/2023/01/why-is-cybersecurity-crucial-to-the-fintech-sector/   
Published: 2023 01 20 06:43:48
Received: 2023 01 20 08:28:33
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Google pays hacker duo $22k in bug bounties for flaws in multiple cloud projects - published about 2 years ago.
Content: View all bug bounty news · Bug Bounty Radar. The latest programs for January 2023. Bug bounties · DevSecOps Security best practices Dev stack tech.
https://portswigger.net/daily-swig/google-pays-hacker-duo-22k-in-bug-bounties-for-flaws-in-multiple-cloud-projects   
Published: 2023 01 20 08:10:05
Received: 2023 01 20 08:28:33
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Google pays hacker duo $22k in bug bounties for flaws in multiple cloud projects - published about 2 years ago.
Content: View all bug bounty news · Bug Bounty Radar. The latest programs for January 2023. Bug bounties · DevSecOps Security best practices Dev stack tech.
https://portswigger.net/daily-swig/google-pays-hacker-duo-22k-in-bug-bounties-for-flaws-in-multiple-cloud-projects   
Published: 2023 01 20 08:10:05
Received: 2023 01 20 08:28:33
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: New Chinese Malware Spotted Exploiting Recent Fortinet Firewall Vulnerability - published about 2 years ago.
Content:
https://thehackernews.com/2023/01/new-chinese-malware-spotted-exploiting.html   
Published: 2023 01 20 06:59:00
Received: 2023 01 20 08:03:39
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: New Chinese Malware Spotted Exploiting Recent Fortinet Firewall Vulnerability - published about 2 years ago.
Content:
https://thehackernews.com/2023/01/new-chinese-malware-spotted-exploiting.html   
Published: 2023 01 20 06:59:00
Received: 2023 01 20 08:03:39
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Nikesh Arora Emphasises The Need To Tighten Cyber Security In A Digital World - published about 2 years ago.
Content: Nikesh Arora Emphasises The Need To Tighten Cyber Security In A Digital World. BusinessToday.In. New Delhi ,; Jan 20, 2023,; Updated Jan 20, 2023, ...
https://www.businesstoday.in/bt-tv/davos-brainstorm-2023/video/nikesh-arora-emphasises-the-need-to-tighten-cyber-security-in-a-digital-world-366842-2023-01-20   
Published: 2023 01 20 07:51:01
Received: 2023 01 20 08:03:17
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Nikesh Arora Emphasises The Need To Tighten Cyber Security In A Digital World - published about 2 years ago.
Content: Nikesh Arora Emphasises The Need To Tighten Cyber Security In A Digital World. BusinessToday.In. New Delhi ,; Jan 20, 2023,; Updated Jan 20, 2023, ...
https://www.businesstoday.in/bt-tv/davos-brainstorm-2023/video/nikesh-arora-emphasises-the-need-to-tighten-cyber-security-in-a-digital-world-366842-2023-01-20   
Published: 2023 01 20 07:51:01
Received: 2023 01 20 08:03:17
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: New Chinese Malware Spotted Exploiting Recent Fortinet Firewall Vulnerability - published about 2 years ago.
Content:
https://thehackernews.com/2023/01/new-chinese-malware-spotted-exploiting.html   
Published: 2023 01 20 06:59:00
Received: 2023 01 20 08:02:06
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: New Chinese Malware Spotted Exploiting Recent Fortinet Firewall Vulnerability - published about 2 years ago.
Content:
https://thehackernews.com/2023/01/new-chinese-malware-spotted-exploiting.html   
Published: 2023 01 20 06:59:00
Received: 2023 01 20 08:02:06
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Weekly Update 331 - published about 2 years ago.
Content: Presently sponsored by: CrowdSec - Gain crowd-sourced protection against malicious IPs and benefit from the most accurate CTI in the world. Get started for free.Well and truly back into the swing of things in the new year, I think what I've found most satisfying this week is to sit down and pump out a decent blog post on something technical. It's an itch I j...
https://www.troyhunt.com/weekly-update-331/   
Published: 2023 01 20 07:22:13
Received: 2023 01 20 08:01:21
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Weekly Update 331 - published about 2 years ago.
Content: Presently sponsored by: CrowdSec - Gain crowd-sourced protection against malicious IPs and benefit from the most accurate CTI in the world. Get started for free.Well and truly back into the swing of things in the new year, I think what I've found most satisfying this week is to sit down and pump out a decent blog post on something technical. It's an itch I j...
https://www.troyhunt.com/weekly-update-331/   
Published: 2023 01 20 07:22:13
Received: 2023 01 20 08:01:21
Feed: Troy Hunt's Blog
Source: Troy Hunt's Blog
Category: Cyber Security
Topic: Cyber Security
Article: Cybersecurity Sleuths Put Ethical Hacking Skills to the Test | CSUF News - published about 2 years ago.
Content: A team of Cal State Fullerton cybersecurity students put their hacking skills to the test at the Collegiate Penetration Testing Competition global ...
https://news.fullerton.edu/2023/01/cybersecurity-sleuths-put-ethical-hacking-skills-to-the-test/   
Published: 2023 01 20 06:38:30
Received: 2023 01 20 07:22:43
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity Sleuths Put Ethical Hacking Skills to the Test | CSUF News - published about 2 years ago.
Content: A team of Cal State Fullerton cybersecurity students put their hacking skills to the test at the Collegiate Penetration Testing Competition global ...
https://news.fullerton.edu/2023/01/cybersecurity-sleuths-put-ethical-hacking-skills-to-the-test/   
Published: 2023 01 20 06:38:30
Received: 2023 01 20 07:22:43
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Federal agencies must step up cybersecurity: GAO - Business Insurance | News - published about 2 years ago.
Content: Federal agencies must do a better job securing internet-connected devices, among other cybersecurity measures, the U.S. Government Accountability ...
https://www.businessinsurance.com/article/20230119/NEWS06/912354997/Federal-agencies-must-step-up-cybersecurity-GAO   
Published: 2023 01 20 06:42:04
Received: 2023 01 20 07:22:43
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Federal agencies must step up cybersecurity: GAO - Business Insurance | News - published about 2 years ago.
Content: Federal agencies must do a better job securing internet-connected devices, among other cybersecurity measures, the U.S. Government Accountability ...
https://www.businessinsurance.com/article/20230119/NEWS06/912354997/Federal-agencies-must-step-up-cybersecurity-GAO   
Published: 2023 01 20 06:42:04
Received: 2023 01 20 07:22:43
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Miscreants sure do love ransacking cloud networks, more so than before - published about 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2023/01/20/cloud_networks_under_attack/   
Published: 2023 01 20 06:27:13
Received: 2023 01 20 06:42:40
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: Miscreants sure do love ransacking cloud networks, more so than before - published about 2 years ago.
Content:
https://go.theregister.com/feed/www.theregister.com/2023/01/20/cloud_networks_under_attack/   
Published: 2023 01 20 06:27:13
Received: 2023 01 20 06:42:40
Feed: The Register - Security
Source: The Register - Security
Category: Cyber Security
Topic: Cyber Security
Article: iPad Pro With OLED Display Again Rumored for Launch Next Year - published about 2 years ago.
Content:
https://www.macrumors.com/2023/01/20/apple-work-oled-for-ipad-macbook/   
Published: 2023 01 20 06:04:54
Received: 2023 01 20 06:24:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: iPad Pro With OLED Display Again Rumored for Launch Next Year - published about 2 years ago.
Content:
https://www.macrumors.com/2023/01/20/apple-work-oled-for-ipad-macbook/   
Published: 2023 01 20 06:04:54
Received: 2023 01 20 06:24:38
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: T-Mobile breached again, 37M customer accounts exposed | Cybersecurity Dive - published about 2 years ago.
Content: ... to trace the source of the malicious activity to an application programming interface and stop it with the help of cybersecurity consultants.
https://www.cybersecuritydive.com/news/tmobile-breach-customer-compromise/640812/   
Published: 2023 01 19 23:06:09
Received: 2023 01 20 06:22:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: T-Mobile breached again, 37M customer accounts exposed | Cybersecurity Dive - published about 2 years ago.
Content: ... to trace the source of the malicious activity to an application programming interface and stop it with the help of cybersecurity consultants.
https://www.cybersecuritydive.com/news/tmobile-breach-customer-compromise/640812/   
Published: 2023 01 19 23:06:09
Received: 2023 01 20 06:22:17
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: International Council of E-Commerce Consultants Launches Cybersecurity Essentials ... - published about 2 years ago.
Content: PRNewswire/ -- The International Council of E-Commerce Consultants (EC-Council), a developer of world-class cybersecurity education programs and.
https://www.prnewswire.com/news-releases/international-council-of-e-commerce-consultants-launches-cybersecurity-essentials-professional-certificate-program-on-edx-301725443.html   
Published: 2023 01 20 04:39:53
Received: 2023 01 20 06:22:16
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: International Council of E-Commerce Consultants Launches Cybersecurity Essentials ... - published about 2 years ago.
Content: PRNewswire/ -- The International Council of E-Commerce Consultants (EC-Council), a developer of world-class cybersecurity education programs and.
https://www.prnewswire.com/news-releases/international-council-of-e-commerce-consultants-launches-cybersecurity-essentials-professional-certificate-program-on-edx-301725443.html   
Published: 2023 01 20 04:39:53
Received: 2023 01 20 06:22:16
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Cybersecurity priorities for mobile operators in 2023 - SecurityBrief Australia - published about 2 years ago.
Content: As 5G's global footprint increases, the number of cyber threats targeting 5G increases as well, according to new research.
https://securitybrief.com.au/story/cybersecurity-priorities-for-mobile-operators-in-2023   
Published: 2023 01 20 05:16:21
Received: 2023 01 20 06:22:16
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity priorities for mobile operators in 2023 - SecurityBrief Australia - published about 2 years ago.
Content: As 5G's global footprint increases, the number of cyber threats targeting 5G increases as well, according to new research.
https://securitybrief.com.au/story/cybersecurity-priorities-for-mobile-operators-in-2023   
Published: 2023 01 20 05:16:21
Received: 2023 01 20 06:22:16
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: New infosec products of the week: January 20, 2023 - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2023/01/20/new-infosec-products-of-the-week-january-20-2023/   
Published: 2023 01 20 05:30:21
Received: 2023 01 20 06:20:17
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: New infosec products of the week: January 20, 2023 - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2023/01/20/new-infosec-products-of-the-week-january-20-2023/   
Published: 2023 01 20 05:30:21
Received: 2023 01 20 06:20:17
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published over 5 years ago.
Content: Amnesia / Radiation botnet samples targeting Remote Code Execution in CCTV DVR 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet2016-08-11 CyberX Radiation IoT Cybersecurity campaignDownload             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA174bf554c4bc30d172cf1d73ac553d7...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html   
Published: 2019 10 06 21:16:00
Received: 2023 01 20 06:19:39
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published over 5 years ago.
Content: Amnesia / Radiation botnet samples targeting Remote Code Execution in CCTV DVR 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet2016-08-11 CyberX Radiation IoT Cybersecurity campaignDownload             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA174bf554c4bc30d172cf1d73ac553d7...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html   
Published: 2019 10 06 21:16:00
Received: 2023 01 20 06:19:39
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published over 5 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Download     ...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html   
Published: 2019 10 07 03:48:00
Received: 2023 01 20 06:19:38
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published over 5 years ago.
Content: 2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Download     ...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html   
Published: 2019 10 07 03:48:00
Received: 2023 01 20 06:19:38
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-22373 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22373   
Published: 2023 01 20 03:15:10
Received: 2023 01 20 06:15:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-22373 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22373   
Published: 2023 01 20 03:15:10
Received: 2023 01 20 06:15:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-22339 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22339   
Published: 2023 01 20 03:15:10
Received: 2023 01 20 06:15:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-22339 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22339   
Published: 2023 01 20 03:15:10
Received: 2023 01 20 06:15:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: CVE-2023-22334 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22334   
Published: 2023 01 20 03:15:10
Received: 2023 01 20 06:15:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-22334 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22334   
Published: 2023 01 20 03:15:10
Received: 2023 01 20 06:15:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: CVE-2023-22331 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22331   
Published: 2023 01 20 03:15:09
Received: 2023 01 20 06:15:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-22331 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-22331   
Published: 2023 01 20 03:15:09
Received: 2023 01 20 06:15:00
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0410 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0410   
Published: 2023 01 20 01:15:10
Received: 2023 01 20 06:14:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2023-0410 - published about 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-0410   
Published: 2023 01 20 01:15:10
Received: 2023 01 20 06:14:51
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: End of Support for Microsoft Windows and Microsoft Windows Server | Cyber.gov.au - published about 2 years ago.
Content: The Strategies to Mitigate Cyber Security Incidents ranks timely patching of security vulnerabilities, as well as using the latest operating ...
https://www.cyber.gov.au/acsc/view-all-content/publications/end-support-microsoft-windows-and-microsoft-windows-server   
Published: 2023 01 20 02:41:46
Received: 2023 01 20 06:02:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: End of Support for Microsoft Windows and Microsoft Windows Server | Cyber.gov.au - published about 2 years ago.
Content: The Strategies to Mitigate Cyber Security Incidents ranks timely patching of security vulnerabilities, as well as using the latest operating ...
https://www.cyber.gov.au/acsc/view-all-content/publications/end-support-microsoft-windows-and-microsoft-windows-server   
Published: 2023 01 20 02:41:46
Received: 2023 01 20 06:02:36
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: APT Calypso RAT, Flying Dutchman Samples - published about 5 years ago.
Content: 2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.  Download. Email me if you need the password (s...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html   
Published: 2019 12 02 04:46:00
Received: 2023 01 20 05:59:42
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: APT Calypso RAT, Flying Dutchman Samples - published about 5 years ago.
Content: 2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.  Download. Email me if you need the password (s...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html   
Published: 2019 12 02 04:46:00
Received: 2023 01 20 05:59:42
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: ShellShock payload sample Linux.Bashlet - published over 10 years ago.
Content: Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here:MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun...DownloadDownload. Email me if you need the passwordFile InformationFile: fu4k_2485040231A35B7A465361FAF92A512DSize: 152MD5: 2485040231A35B7A465...
https://contagiodump.blogspot.com/2014/10/shellshock-payload-sample-linuxbashlet.html   
Published: 2014 10 02 12:12:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: ShellShock payload sample Linux.Bashlet - published over 10 years ago.
Content: Someone kindly shared their sample of the shellshock malware described by the Malware Must die group - you can read their analysis here:MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun...DownloadDownload. Email me if you need the passwordFile InformationFile: fu4k_2485040231A35B7A465361FAF92A512DSize: 152MD5: 2485040231A35B7A465...
https://contagiodump.blogspot.com/2014/10/shellshock-payload-sample-linuxbashlet.html   
Published: 2014 10 02 12:12:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples - published over 10 years ago.
Content: PART IIWirelurker for Windows (WinLurker)Research: Palo Alto Claud Xiao: Wirelurker for WindowsSample credit: Claud XiaoPART I Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X MalwarePalo Alto |Claud Xiao - blog post WirelurkerWirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetectorSample credit: Claud XiaoDownloadDow...
https://contagiodump.blogspot.com/2014/11/wirelurker-for-osx-ios-part-i-and.html   
Published: 2014 11 07 01:57:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Wirelurker for OSX, iOS (Part I) and Windows (Part II) samples - published over 10 years ago.
Content: PART IIWirelurker for Windows (WinLurker)Research: Palo Alto Claud Xiao: Wirelurker for WindowsSample credit: Claud XiaoPART I Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X MalwarePalo Alto |Claud Xiao - blog post WirelurkerWirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetectorSample credit: Claud XiaoDownloadDow...
https://contagiodump.blogspot.com/2014/11/wirelurker-for-osx-ios-part-i-and.html   
Published: 2014 11 07 01:57:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: OnionDuke samples - published over 10 years ago.
Content: Research:  F-Secure: OnionDuke: APT Attacks Via the Tor NetworkDownloadDownload. Email me if you need the password (new link)File attributesSize: 219136MD5:  28F96A57FA5FF663926E9BAD51A1D0CBSize: 126464MD5:  C8EB6040FD02D77660D19057A38FF769Size: 316928MD5:  D1CE79089578DA2D41F1AD901F7B1014Virustotal infohttps://www.virustotal.com/en/file/366affd094cc63e2c19c...
https://contagiodump.blogspot.com/2014/11/onionduke-samples.html   
Published: 2014 11 16 03:58:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: OnionDuke samples - published over 10 years ago.
Content: Research:  F-Secure: OnionDuke: APT Attacks Via the Tor NetworkDownloadDownload. Email me if you need the password (new link)File attributesSize: 219136MD5:  28F96A57FA5FF663926E9BAD51A1D0CBSize: 126464MD5:  C8EB6040FD02D77660D19057A38FF769Size: 316928MD5:  D1CE79089578DA2D41F1AD901F7B1014Virustotal infohttps://www.virustotal.com/en/file/366affd094cc63e2c19c...
https://contagiodump.blogspot.com/2014/11/onionduke-samples.html   
Published: 2014 11 16 03:58:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: AlienSpy Java RAT samples and traffic information - published over 10 years ago.
Content: AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014.It appears to be used in the same campaigns as was Unrccom/Adwind - see the references. If C2 responds, the java RAT downloads Jar files containing Windows Pony/Ponik loader. The RAT is crossplatform and insta...
https://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html   
Published: 2014 11 17 21:16:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: AlienSpy Java RAT samples and traffic information - published over 10 years ago.
Content: AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014.It appears to be used in the same campaigns as was Unrccom/Adwind - see the references. If C2 responds, the java RAT downloads Jar files containing Windows Pony/Ponik loader. The RAT is crossplatform and insta...
https://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html   
Published: 2014 11 17 21:16:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Video archives of security conferences and workshops - published about 10 years ago.
Content: Just some links for your enjoymentList of security conferences in 2014Video archives:AIDE (Appalachian Institute of Digital Evidence)201320122011Blackhat2012 or 2012 torrentBotconf2013BsidesBSides DC 2014BSides Chicago 2014BSides Nashville 2014BSides Augusta 2014BSides Huntsville 2014BSides Las Vegas 2014BSidesDE 2013BSidesLV 2013BSidesRI 2013Bsides Clevelan...
https://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html   
Published: 2015 01 05 04:11:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Video archives of security conferences and workshops - published about 10 years ago.
Content: Just some links for your enjoymentList of security conferences in 2014Video archives:AIDE (Appalachian Institute of Digital Evidence)201320122011Blackhat2012 or 2012 torrentBotconf2013BsidesBSides DC 2014BSides Chicago 2014BSides Nashville 2014BSides Augusta 2014BSides Huntsville 2014BSides Las Vegas 2014BSidesDE 2013BSidesLV 2013BSidesRI 2013Bsides Clevelan...
https://contagiodump.blogspot.com/2015/01/video-archives-of-security-conferences.html   
Published: 2015 01 05 04:11:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Collection of Pcap files from malware analysis - published about 10 years ago.
Content: Update: Feb 19. 2015We have been adding pcaps to the collection so remember to check out the folder ( Pcap collection) for the recent pcaps.I had a project to test some malicious and exploit pcaps and collected a lot of them (almost 1000) from various public sources. You can see them in the PUBLIC folder. The credits go to the authors of the pcaps listed in ...
https://contagiodump.blogspot.com/2013/04/collection-of-pcap-files-from-malware.html   
Published: 2015 02 20 04:39:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Collection of Pcap files from malware analysis - published about 10 years ago.
Content: Update: Feb 19. 2015We have been adding pcaps to the collection so remember to check out the folder ( Pcap collection) for the recent pcaps.I had a project to test some malicious and exploit pcaps and collected a lot of them (almost 1000) from various public sources. You can see them in the PUBLIC folder. The credits go to the authors of the pcaps listed in ...
https://contagiodump.blogspot.com/2013/04/collection-of-pcap-files-from-malware.html   
Published: 2015 02 20 04:39:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ask and you shall receive - published almost 10 years ago.
Content: I get emails from readers asking for specific malware samples and thought I would make a mini post about it.Yes, I often obtain samples from various sources for my own research. I am sometimes too lazy/busy to post them but don't mind sharing.If you are looking for a particular sample, feel free to ask. I might have it.Send MD5 (several or few samples). I ca...
https://contagiodump.blogspot.com/2015/03/ask-and-you-shall-receive.html   
Published: 2015 03 09 01:08:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ask and you shall receive - published almost 10 years ago.
Content: I get emails from readers asking for specific malware samples and thought I would make a mini post about it.Yes, I often obtain samples from various sources for my own research. I am sometimes too lazy/busy to post them but don't mind sharing.If you are looking for a particular sample, feel free to ask. I might have it.Send MD5 (several or few samples). I ca...
https://contagiodump.blogspot.com/2015/03/ask-and-you-shall-receive.html   
Published: 2015 03 09 01:08:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: An Overview of Exploit Packs (Update 25) May 2015 - published almost 10 years ago.
Content: Update May 12, 2015Added CVE-2015-0359 and updates for CVE-2015-0336 Exploit kit table 2014- 2015 (Sortable HTML table)Reference table : Exploit References 2014-2015Update March 20, 2015Added CVE-2015-0336------------------------Update February 19, 2015Added Hanjuan Exploit kit and CVE-2015-3013 for Angler Update January 24, 2015 http://www.kahusecurity.comA...
https://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html   
Published: 2015 05 12 04:30:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: An Overview of Exploit Packs (Update 25) May 2015 - published almost 10 years ago.
Content: Update May 12, 2015Added CVE-2015-0359 and updates for CVE-2015-0336 Exploit kit table 2014- 2015 (Sortable HTML table)Reference table : Exploit References 2014-2015Update March 20, 2015Added CVE-2015-0336------------------------Update February 19, 2015Added Hanjuan Exploit kit and CVE-2015-3013 for Angler Update January 24, 2015 http://www.kahusecurity.comA...
https://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html   
Published: 2015 05 12 04:30:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Potao Express samples - published over 9 years ago.
Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdfTL; DR2011- July 2015Aka  Sapotao and node69Group - Sandworm / Quedagh APTVectors - USB, exe as doc, xlsVictims - RU, BY, AM, GE Victims - MMM group, UA govtruecryptrussia.ru has been serving modified v...
https://contagiodump.blogspot.com/2015/08/potao-express-samples.html   
Published: 2015 08 12 12:24:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Potao Express samples - published over 9 years ago.
Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdfTL; DR2011- July 2015Aka  Sapotao and node69Group - Sandworm / Quedagh APTVectors - USB, exe as doc, xlsVictims - RU, BY, AM, GE Victims - MMM group, UA govtruecryptrussia.ru has been serving modified v...
https://contagiodump.blogspot.com/2015/08/potao-express-samples.html   
Published: 2015 08 12 12:24:00
Received: 2023 01 20 05:39:49
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Files download information - published about 9 years ago.
Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account.It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with Google and...
https://contagiodump.blogspot.com/2016/02/files-download-information.html   
Published: 2016 02 23 20:48:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Files download information - published about 9 years ago.
Content: After 7 years of Contagio existence, Google Safe Browsing services notified Mediafire (hoster of Contagio and Contagiominidump files) that "harmful" content is hosted on my Mediafire account.It is harmful only if you harm your own pc and but not suitable for distribution or infecting unsuspecting users but I have not been able to resolve this with Google and...
https://contagiodump.blogspot.com/2016/02/files-download-information.html   
Published: 2016 02 23 20:48:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Ransomware.OSX.KeRanger samples - published almost 9 years ago.
Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud XiaoSample credit: Claud XiaoFile informationd1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1 1d6297e2427f1d00a5b355d6d50809cb Transmission-2.90.dmge3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574 56b1d956112b0b7bd3e44f20cf1f2c19 ...
https://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html   
Published: 2016 03 06 23:39:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Ransomware.OSX.KeRanger samples - published almost 9 years ago.
Content: Research: New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer by Claud XiaoSample credit: Claud XiaoFile informationd1ac55a4e610380f0ab239fcc1c5f5a42722e8ee1554cba8074bbae4a5f6dbe1 1d6297e2427f1d00a5b355d6d50809cb Transmission-2.90.dmge3ad733cea9eba29e86610050c1a15592e6c77820927b9edeb77310975393574 56b1d956112b0b7bd3e44f20cf1f2c19 ...
https://contagiodump.blogspot.com/2016/03/ransomwareosxkeranger-samples.html   
Published: 2016 03 06 23:39:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: "i am lady" Linux.Lady trojan samples - published over 8 years ago.
Content: Bitcoin mining malware for Linux servers - samplesResearch: Dr. Web. Linux.LadySample Credit:  Tim StrazzereMD5 list:0DE8BCA756744F7F2BDB732E3267C3F455952F4F41A184503C467141B6171BA786AC68E5B09D1C4B157193BB6CB34007E2CACA9626ED93C3D137FDF494FDAE7CE9423E072AD5A31A80A31FC1F525D614Download. Email me if you need the password....
https://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html   
Published: 2016 08 17 04:06:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: "i am lady" Linux.Lady trojan samples - published over 8 years ago.
Content: Bitcoin mining malware for Linux servers - samplesResearch: Dr. Web. Linux.LadySample Credit:  Tim StrazzereMD5 list:0DE8BCA756744F7F2BDB732E3267C3F455952F4F41A184503C467141B6171BA786AC68E5B09D1C4B157193BB6CB34007E2CACA9626ED93C3D137FDF494FDAE7CE9423E072AD5A31A80A31FC1F525D614Download. Email me if you need the password....
https://contagiodump.blogspot.com/2016/08/i-am-lady-linuxlady-trojan-samples.html   
Published: 2016 08 17 04:06:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux.Agent malware sample - data stealer - published over 8 years ago.
Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight?Sample credit: Tim StrazzereList of files9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65  malwared507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c  malwarefddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c  script.decompiled-prettyec5d4f90c91273b3794814be...
https://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html   
Published: 2016 08 24 04:18:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux.Agent malware sample - data stealer - published over 8 years ago.
Content: Research: SentinelOne, Tim Strazzere Hiding in plain sight?Sample credit: Tim StrazzereList of files9f7ead4a7e9412225be540c30e04bf98dbd69f62b8910877f0f33057ca153b65  malwared507119f6684c2d978129542f632346774fa2e96cf76fa77f377d130463e9c2c  malwarefddb36800fbd0a9c9bfffb22ce7eacbccecd1c26b0d3fb3560da5e9ed97ec14c  script.decompiled-prettyec5d4f90c91273b3794814be...
https://contagiodump.blogspot.com/2016/08/linuxagent-malware-sample-data-stealer.html   
Published: 2016 08 24 04:18:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Part I. Russian APT - APT28 collection of samples including OSX XAgent - published about 8 years ago.
Content:  This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart's content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that "400 lb hacker" or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda.The post contains malwar...
https://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html   
Published: 2017 02 21 02:23:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part I. Russian APT - APT28 collection of samples including OSX XAgent - published about 8 years ago.
Content:  This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart's content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that "400 lb hacker" or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda.The post contains malwar...
https://contagiodump.blogspot.com/2017/02/russian-apt-apt28-collection-of-samples.html   
Published: 2017 02 21 02:23:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: DeepEnd Research: Analysis of Trump's secret server story - published almost 8 years ago.
Content:  We posted our take on the Trump's server story. If you have any feedback or corrections, send me an email (see my blog profile on Contagio or DeepEnd Research)Analysis of Trump's secret server story......
https://contagiodump.blogspot.com/2017/03/deepend-research-analysis-of-trumps.html   
Published: 2017 03 20 04:28:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DeepEnd Research: Analysis of Trump's secret server story - published almost 8 years ago.
Content:  We posted our take on the Trump's server story. If you have any feedback or corrections, send me an email (see my blog profile on Contagio or DeepEnd Research)Analysis of Trump's secret server story......
https://contagiodump.blogspot.com/2017/03/deepend-research-analysis-of-trumps.html   
Published: 2017 03 20 04:28:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part II. APT29 Russian APT including Fancy Bear - published almost 8 years ago.
Content: This is the second part of Russian APT series."APT29 - The Dukes Cozy Bear: APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008.1210 This group reportedly compromised the Democratic National Committee starting in the summer of 2015" (src.  Mitre ATT&amp;CK)Please see the first post here: Russian APT -...
https://contagiodump.blogspot.com/2017/03/part-ii-apt29-russian-apt-including.html   
Published: 2017 03 31 06:02:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Part II. APT29 Russian APT including Fancy Bear - published almost 8 years ago.
Content: This is the second part of Russian APT series."APT29 - The Dukes Cozy Bear: APT29 is threat group that has been attributed to the Russian government and has operated since at least 2008.1210 This group reportedly compromised the Democratic National Committee starting in the summer of 2015" (src.  Mitre ATT&amp;CK)Please see the first post here: Russian APT -...
https://contagiodump.blogspot.com/2017/03/part-ii-apt29-russian-apt-including.html   
Published: 2017 03 31 06:02:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: DDE Command Execution malware samples - published over 7 years ago.
Content: Here are a few samples related to the recent DDE Command executionReading:10/18/2017 InQuest/yara-rules 10/18/2017 https://twitter.com/i/moments/918126999738175489 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inquest: Microsoft Office DDE Vortex Ransomware Targeting Poland10/16/2017 https://twitter.com/noottra...
https://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html   
Published: 2017 10 18 06:24:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: DDE Command Execution malware samples - published over 7 years ago.
Content: Here are a few samples related to the recent DDE Command executionReading:10/18/2017 InQuest/yara-rules 10/18/2017 https://twitter.com/i/moments/918126999738175489 10/18/2017 Inquest: Microsoft Office DDE Macro-less Command Execution Vulnerability10/18/2017 Inquest: Microsoft Office DDE Vortex Ransomware Targeting Poland10/16/2017 https://twitter.com/noottra...
https://contagiodump.blogspot.com/2017/10/dde-command-execution-malware-samples.html   
Published: 2017 10 18 06:24:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published almost 7 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM SystemsResearch: Trend MicroThere are two packagesone is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package)DownloadDownload Email me if you need the password  File informationPart one (full package)#File NameHash ValueFile Size (on Disk)Duplicate?...
https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html   
Published: 2018 03 20 13:23:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Rootkit Umbreon / Umreon - x86, ARM samples - published almost 7 years ago.
Content: Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM SystemsResearch: Trend MicroThere are two packagesone is 'found in the wild' full and a set of hashes from Trend Micro (all but one file are already in the full package)DownloadDownload Email me if you need the password  File informationPart one (full package)#File NameHash ValueFile Size (on Disk)Duplicate?...
https://contagiodump.blogspot.com/2018/03/rootkit-umbreon-umreon-x86-arm-samples.html   
Published: 2018 03 20 13:23:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: HiddenWasp Linux malware backdoor samples - published over 5 years ago.
Content: Here are Hidden Wasp Linux backdoor samples. Enjoy Reference Intezer HiddenWasp Malware Stings Targeted Linux Systems  DownloadDownload. Email me if you need the password (see in my profile) File informatio8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b8f1c51c4963c0bad6cf04444feb411d7 shellf321685342fa373c33eb9479176a086a1c56c90a1826a0aef345...
https://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html   
Published: 2019 06 04 04:31:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: HiddenWasp Linux malware backdoor samples - published over 5 years ago.
Content: Here are Hidden Wasp Linux backdoor samples. Enjoy Reference Intezer HiddenWasp Malware Stings Targeted Linux Systems  DownloadDownload. Email me if you need the password (see in my profile) File informatio8914fd1cfade5059e626be90f18972ec963bbed75101c7fbf4a88a6da2bc671b8f1c51c4963c0bad6cf04444feb411d7 shellf321685342fa373c33eb9479176a086a1c56c90a1826a0aef345...
https://contagiodump.blogspot.com/2019/06/hiddenwasp-linux-malware-backdoor.html   
Published: 2019 06 04 04:31:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: Linux/AirDropBot samples - published over 5 years ago.
Content: Reference Malware Must Die:  MMD-0064-2019 - Linux/AirDropBotMirai variant targeting Linksys E-series - Remote Code ExecutiontmUnblock.cgi Download             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA185a8aad8d938c44c3f3f51089a60ec161a75642976449d37acd14b19f67ed7d69499c41aa6304e78c7b2d977e0910e372f0079b...
https://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html   
Published: 2019 10 06 20:37:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Linux/AirDropBot samples - published over 5 years ago.
Content: Reference Malware Must Die:  MMD-0064-2019 - Linux/AirDropBotMirai variant targeting Linksys E-series - Remote Code ExecutiontmUnblock.cgi Download             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA185a8aad8d938c44c3f3f51089a60ec161a75642976449d37acd14b19f67ed7d69499c41aa6304e78c7b2d977e0910e372f0079b...
https://contagiodump.blogspot.com/2019/10/reference-malware-must-die-mmd-0064.html   
Published: 2019 10 06 20:37:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published over 5 years ago.
Content: Reference Amnesia / Radiation botnet samples targeting Remote Code Execution in CCTV DVR 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet2016-08-11 CyberX Radiation IoT Cybersecurity campaignDownload             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA174bf554c4bc30d172cf1...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html   
Published: 2019 10 06 21:16:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Amnesia / Radiation Linux botnet targeting Remote Code Execution in CCTV DVR samples - published over 5 years ago.
Content: Reference Amnesia / Radiation botnet samples targeting Remote Code Execution in CCTV DVR 2017-04-06 Palo Alto Unit 42. New IoT/Linux Malware Targets DVRs, Forms Botnet2016-08-11 CyberX Radiation IoT Cybersecurity campaignDownload             Other malwareDownload. Email me if you need the password (see in my profile) HashesMD5SHA256SHA174bf554c4bc30d172cf1...
https://contagiodump.blogspot.com/2019/10/amnesia-radiation-linux-botnet.html   
Published: 2019 10 06 21:16:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published over 5 years ago.
Content: Reference2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Down...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html   
Published: 2019 10 07 03:48:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: Masad Clipper and Stealer - Windows spyware exfiltrating data via Telegram (samples) - published over 5 years ago.
Content: Reference2019-09-25 Juniper. Masad Stealer: Exfiltrating using Telegram “Masad Clipper and Stealer” steals browser information, computer files,  and automatically replaces cryptocurrency wallets from the clipboard with its own.It is written using Autoit scripts and then compiled into a Windows executable.It uses Telegram to exfiltrate stolen information.Down...
https://contagiodump.blogspot.com/2019/10/masad-clipper-and-stealer-windows.html   
Published: 2019 10 07 03:48:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: APT Calypso RAT, Flying Dutchman Samples - published about 5 years ago.
Content: Reference2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.Download             Other malwareDownlo...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html   
Published: 2019 12 02 04:46:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: APT Calypso RAT, Flying Dutchman Samples - published about 5 years ago.
Content: Reference2019-10-31 Calypso APT: new group attacking state institutions Attackers exploit Windows SMB vulnerability CVE-2017-0143 or use stolen credentials to gain access, deploy the custom Calypso RAT and use it to upload other tools such as Mimikatz, EternalBlue and EternalRomance. They move laterally and steal data.Download             Other malwareDownlo...
https://contagiodump.blogspot.com/2019/12/apt-calypso-rat-flying-dutchman-samples.html   
Published: 2019 12 02 04:46:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: KPOT info stealer samples - published almost 5 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)1. http://contagio.deependresearch.org/crime/kpotstealer_win_samp.zip from Didier Stevens' post2. http://contagio.deependresearch.org/crime/kpotstealer(pr...
https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html   
Published: 2020 04 19 15:27:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: KPOT info stealer samples - published almost 5 years ago.
Content: KPOT Stealer is a “stealer” malware that focuses on stealing account information and other data from various software applications and servicesDownload. Email me if you need the password (see in my profile)1. http://contagio.deependresearch.org/crime/kpotstealer_win_samp.zip from Didier Stevens' post2. http://contagio.deependresearch.org/crime/kpotstealer(pr...
https://contagiodump.blogspot.com/2020/04/kpot-info-stealer-samples.html   
Published: 2020 04 19 15:27:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published about 4 years ago.
Content: 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorDownload dlls. Email me if you need the password (see in my profile)Download Coreinstaller.msi - trojaned installer sample ReferenceI am sure you all saw the news. Links updated: Jan 19, 20232020-12-13 MicrosoftCustomer Gu...
https://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html   
Published: 2020 12 14 14:47:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Article: 2020-12-13 SUNBURST SolarWinds Backdoor samples - published about 4 years ago.
Content: 2020-12-13 Fireeye Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST BackdoorDownload dlls. Email me if you need the password (see in my profile)Download Coreinstaller.msi - trojaned installer sample ReferenceI am sure you all saw the news. Links updated: Jan 19, 20232020-12-13 MicrosoftCustomer Gu...
https://contagiodump.blogspot.com/2020/12/2020-12-13-sunburst-solarwinds-backdoor.html   
Published: 2020 12 14 14:47:00
Received: 2023 01 20 05:39:48
Feed: contagio
Source: contagio
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: International Council of E-Commerce Consultants Launches Cybersecurity Essentials ... - published about 2 years ago.
Content: New program enables students and early career professionals to learn critical skills required in today's entry-level cybersecurity field, ...
https://www.darkreading.com/operations/international-council-of-e-commerce-consultants-launches-cybersecurity-essentials-professional-certificate-program-on-edx   
Published: 2023 01 20 03:12:31
Received: 2023 01 20 05:22:29
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: International Council of E-Commerce Consultants Launches Cybersecurity Essentials ... - published about 2 years ago.
Content: New program enables students and early career professionals to learn critical skills required in today's entry-level cybersecurity field, ...
https://www.darkreading.com/operations/international-council-of-e-commerce-consultants-launches-cybersecurity-essentials-professional-certificate-program-on-edx   
Published: 2023 01 20 03:12:31
Received: 2023 01 20 05:22:29
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Enterprises remain vulnerable through compromised API secrets - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2023/01/20/compromised-api-secrets/   
Published: 2023 01 20 04:00:24
Received: 2023 01 20 05:21:37
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Enterprises remain vulnerable through compromised API secrets - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2023/01/20/compromised-api-secrets/   
Published: 2023 01 20 04:00:24
Received: 2023 01 20 05:21:37
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: The threat of location spoofing and fraud - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2023/01/20/location-spoofing-video/   
Published: 2023 01 20 04:30:51
Received: 2023 01 20 05:21:37
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: The threat of location spoofing and fraud - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2023/01/20/location-spoofing-video/   
Published: 2023 01 20 04:30:51
Received: 2023 01 20 05:21:37
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Zero trust network access for Desktop as a Service - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2023/01/20/zero-trust-network-access-for-desktop-as-a-service/   
Published: 2023 01 20 05:00:16
Received: 2023 01 20 05:21:37
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Article: Zero trust network access for Desktop as a Service - published about 2 years ago.
Content:
https://www.helpnetsecurity.com/2023/01/20/zero-trust-network-access-for-desktop-as-a-service/   
Published: 2023 01 20 05:00:16
Received: 2023 01 20 05:21:37
Feed: Help Net Security - News
Source: Help Net Security - News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained

All Articles

Ordered by Date Received : Year: "2023"
Page: << < 2,481 (of 2,611) > >>

Total Articles in this collection: 130,572


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor