All Articles

Ordered by Date Received : Year: "2022" Month: "05" Day: "23"
Page: << < 5 (of 10) > >>

Total Articles in this collection: 514

Navigation Help at the bottom of the page
Article: Showing Vulnerability to a Machine: Automated Prioritization of Software Vulnerabilities - published over 5 years ago.
Content: Introduction If a software vulnerability can be detected and remedied, then a potential intrusion is prevented. While not all software vulnerabilities are known, 86 percent of vulnerabilities leading to a data breach were patchable, though there is some risk of inadvertent damage when applying software patches. When new vulnerabilities are ide...
https://www.fireeye.com/blog/threat-research/2019/08/automated-prioritization-of-software-vulnerabilities.html   
Published: 2019 08 13 16:45:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Showing Vulnerability to a Machine: Automated Prioritization of Software Vulnerabilities - published over 5 years ago.
Content: Introduction If a software vulnerability can be detected and remedied, then a potential intrusion is prevented. While not all software vulnerabilities are known, 86 percent of vulnerabilities leading to a data breach were patchable, though there is some risk of inadvertent damage when applying software patches. When new vulnerabilities are ide...
https://www.fireeye.com/blog/threat-research/2019/08/automated-prioritization-of-software-vulnerabilities.html   
Published: 2019 08 13 16:45:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Finding Evil in Windows 10 Compressed Memory, Part Three: Automating Undocumented Structure Extraction - published over 5 years ago.
Content: This is the final post in the three-part series: Finding Evil in Windows 10 Compressed Memory. In the first post (Volatility and Rekall Tools), the FLARE team introduced updates to both memory forensic toolkits. These updates enabled these open source tools to analyze previously inaccessible compressed data in memory. This research was shared...
https://www.fireeye.com/blog/threat-research/2019/08/finding-evil-in-windows-ten-compressed-memory-part-three.html   
Published: 2019 08 08 20:45:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Finding Evil in Windows 10 Compressed Memory, Part Three: Automating Undocumented Structure Extraction - published over 5 years ago.
Content: This is the final post in the three-part series: Finding Evil in Windows 10 Compressed Memory. In the first post (Volatility and Rekall Tools), the FLARE team introduced updates to both memory forensic toolkits. These updates enabled these open source tools to analyze previously inaccessible compressed data in memory. This research was shared...
https://www.fireeye.com/blog/threat-research/2019/08/finding-evil-in-windows-ten-compressed-memory-part-three.html   
Published: 2019 08 08 20:45:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software - published about 5 years ago.
Content: Introduction This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing something quite unusual. It is not a tool or a virtual machine distribution, nor is it a plugin or script for a popular reverse engineering tool or framework. Rather, it is a profile created for a consu...
https://www.fireeye.com/blog/threat-research/2019/10/controlling-ida-pro-with-voice-control-software.html   
Published: 2019 10 03 17:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software - published about 5 years ago.
Content: Introduction This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing something quite unusual. It is not a tool or a virtual machine distribution, nor is it a plugin or script for a popular reverse engineering tool or framework. Rather, it is a profile created for a consu...
https://www.fireeye.com/blog/threat-research/2019/10/controlling-ida-pro-with-voice-control-software.html   
Published: 2019 10 03 17:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Definitive Dossier of Devilish Debug Details – Part Deux: A Didactic Deep Dive into Data Driven Deductions - published about 5 years ago.
Content: In Part One of this blog series, Steve Miller outlined what PDB paths are, how they appear in malware, how we use them to detect malicious files, and how we sometimes use them to make associations about groups and actors. As Steve continued his research into PDB paths, we became interested in applying more general statistical analysis. The PDB p...
https://www.fireeye.com/blog/threat-research/2019/10/definitive-dossier-of-devilish-debug-details-part-deux.html   
Published: 2019 10 17 15:30:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Definitive Dossier of Devilish Debug Details – Part Deux: A Didactic Deep Dive into Data Driven Deductions - published about 5 years ago.
Content: In Part One of this blog series, Steve Miller outlined what PDB paths are, how they appear in malware, how we use them to detect malicious files, and how we sometimes use them to make associations about groups and actors. As Steve continued his research into PDB paths, we became interested in applying more general statistical analysis. The PDB p...
https://www.fireeye.com/blog/threat-research/2019/10/definitive-dossier-of-devilish-debug-details-part-deux.html   
Published: 2019 10 17 15:30:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Operation GreedyWonk: Multiple Economic and Foreign Policy Sites Compromised, Serving Up Flash Zero-Day Exploit - published almost 11 years ago.
Content: Less than a week after uncovering Operation SnowMan, the FireEye Dynamic Threat Intelligence cloud has identified another targeted attack campaign — this one exploiting a zero-day vulnerability in Flash. We are collaborating with Adobe security on this issue. Adobe has assigned the CVE identifier CVE-2014-0502 to this vulnerability and released a s...
https://www.fireeye.com/blog/threat-research/2014/02/operation-greedywonk-multiple-economic-and-foreign-policy-sites-compromised-serving-up-flash-zero-day-exploit.html   
Published: 2014 02 20 18:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Operation GreedyWonk: Multiple Economic and Foreign Policy Sites Compromised, Serving Up Flash Zero-Day Exploit - published almost 11 years ago.
Content: Less than a week after uncovering Operation SnowMan, the FireEye Dynamic Threat Intelligence cloud has identified another targeted attack campaign — this one exploiting a zero-day vulnerability in Flash. We are collaborating with Adobe security on this issue. Adobe has assigned the CVE identifier CVE-2014-0502 to this vulnerability and released a s...
https://www.fireeye.com/blog/threat-research/2014/02/operation-greedywonk-multiple-economic-and-foreign-policy-sites-compromised-serving-up-flash-zero-day-exploit.html   
Published: 2014 02 20 18:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Attention is All They Need: Combatting Social Media Information Operations With Neural Language Models - published about 5 years ago.
Content: Information operations have flourished on social media in part because they can be conducted cheaply, are relatively low risk, have immediate global reach, and can exploit the type of viral amplification incentivized by platforms. Using networks of coordinated accounts, social media-driven information operations disseminate and amplify content desi...
https://www.fireeye.com/blog/threat-research/2019/11/combatting-social-media-information-operations-neural-language-models.html   
Published: 2019 11 14 17:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Attention is All They Need: Combatting Social Media Information Operations With Neural Language Models - published about 5 years ago.
Content: Information operations have flourished on social media in part because they can be conducted cheaply, are relatively low risk, have immediate global reach, and can exploit the type of viral amplification incentivized by platforms. Using networks of coordinated accounts, social media-driven information operations disseminate and amplify content desi...
https://www.fireeye.com/blog/threat-research/2019/11/combatting-social-media-information-operations-neural-language-models.html   
Published: 2019 11 14 17:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: FIDL: FLARE’s IDA Decompiler Library - published almost 5 years ago.
Content: IDA Pro and the Hex Rays decompiler are a core part of any toolkit for reverse engineering and vulnerability research. In a previous blog post we discussed how the Hex-Rays API can be used to solve small, well-defined problems commonly seen as part of malware analysis. Having access to a higher-level representation of binary code makes the Hex-Rays...
https://www.fireeye.com/blog/threat-research/2019/11/fidl-flare-ida-decompiler-library.html   
Published: 2019 11 25 20:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: FIDL: FLARE’s IDA Decompiler Library - published almost 5 years ago.
Content: IDA Pro and the Hex Rays decompiler are a core part of any toolkit for reverse engineering and vulnerability research. In a previous blog post we discussed how the Hex-Rays API can be used to solve small, well-defined problems commonly seen as part of malware analysis. Having access to a higher-level representation of binary code makes the Hex-Rays...
https://www.fireeye.com/blog/threat-research/2019/11/fidl-flare-ida-decompiler-library.html   
Published: 2019 11 25 20:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Nice Try: 501 (Ransomware) Not Implemented - published almost 5 years ago.
Content: An Ever-Evolving Threat Since January 10, 2020, FireEye has tracked extensive global exploitation of CVE-2019-19781, which continues to impact Citrix ADC and Gateway instances that are unpatched or do not have mitigations applied. We previously reported on attackers’ swift attempts to exploit this vulnerability and the post-compromise deploy...
https://www.fireeye.com/blog/threat-research/2020/01/nice-try-501-ransomware-not-implemented.html   
Published: 2020 01 24 17:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Nice Try: 501 (Ransomware) Not Implemented - published almost 5 years ago.
Content: An Ever-Evolving Threat Since January 10, 2020, FireEye has tracked extensive global exploitation of CVE-2019-19781, which continues to impact Citrix ADC and Gateway instances that are unpatched or do not have mitigations applied. We previously reported on attackers’ swift attempts to exploit this vulnerability and the post-compromise deploy...
https://www.fireeye.com/blog/threat-research/2020/01/nice-try-501-ransomware-not-implemented.html   
Published: 2020 01 24 17:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests - published almost 5 years ago.
Content: In May 2019, FireEye Threat Intelligence published a blog post exposing a network of English-language social media accounts that engaged in inauthentic behavior and misrepresentation that we assessed with low confidence was organized in support of Iranian political interests. Personas in that network impersonated candidates for U.S. House of Re...
https://www.fireeye.com/blog/threat-research/2020/02/information-operations-fabricated-personas-to-promote-iranian-interests.html   
Published: 2020 02 12 12:30:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: "Distinguished Impersonator" Information Operation That Previously Impersonated U.S. Politicians and Journalists on Social Media Leverages Fabricated U.S. Liberal Personas to Promote Iranian Interests - published almost 5 years ago.
Content: In May 2019, FireEye Threat Intelligence published a blog post exposing a network of English-language social media accounts that engaged in inauthentic behavior and misrepresentation that we assessed with low confidence was organized in support of Iranian political interests. Personas in that network impersonated candidates for U.S. House of Re...
https://www.fireeye.com/blog/threat-research/2020/02/information-operations-fabricated-personas-to-promote-iranian-interests.html   
Published: 2020 02 12 12:30:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Social Engineering Based on Stimulus Bill and COVID-19 Financial Compensation Schemes Expected to Grow in Coming Weeks - published over 4 years ago.
Content: Given the community interest and media coverage surrounding the economic stimulus bill currently being considered by the United States House of Representatives, we anticipate attackers will increasingly leverage lures tailored to the new stimulus bill and related recovery efforts such as stimulus checks, unemployment compensation and small business...
https://www.fireeye.com/blog/threat-research/2020/03/stimulus-bill-social-engineering-covid-19-financial-compensation-schemes.html   
Published: 2020 03 27 19:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Social Engineering Based on Stimulus Bill and COVID-19 Financial Compensation Schemes Expected to Grow in Coming Weeks - published over 4 years ago.
Content: Given the community interest and media coverage surrounding the economic stimulus bill currently being considered by the United States House of Representatives, we anticipate attackers will increasingly leverage lures tailored to the new stimulus bill and related recovery efforts such as stimulus checks, unemployment compensation and small business...
https://www.fireeye.com/blog/threat-research/2020/03/stimulus-bill-social-engineering-covid-19-financial-compensation-schemes.html   
Published: 2020 03 27 19:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Thinking Outside the Bochs: Code Grafting to Unpack Malware in Emulation - published over 4 years ago.
Content: This blog post continues the FLARE script series with a discussion of patching IDA Pro database files (IDBs) to interactively emulate code. While the fastest way to analyze or unpack malware is often to run it, malware won’t always successfully execute in a VM. I use IDA Pro’s Bochs integration in IDB mode to sidestep tedious debugging scenarios ...
https://www.fireeye.com/blog/threat-research/2020/04/code-grafting-to-unpack-malware-in-emulation.html   
Published: 2020 04 07 16:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Thinking Outside the Bochs: Code Grafting to Unpack Malware in Emulation - published over 4 years ago.
Content: This blog post continues the FLARE script series with a discussion of patching IDA Pro database files (IDBs) to interactively emulate code. While the fastest way to analyze or unpack malware is often to run it, malware won’t always successfully execute in a VM. I use IDA Pro’s Bochs integration in IDB mode to sidestep tedious debugging scenarios ...
https://www.fireeye.com/blog/threat-research/2020/04/code-grafting-to-unpack-malware-in-emulation.html   
Published: 2020 04 07 16:00:00
Received: 2022 05 23 16:06:46
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Limited Shifts in the Cyber Threat Landscape Driven by COVID-19 - published over 4 years ago.
Content: Though COVID-19 has had enormous effects on our society and economy, its effects on the cyber threat landscape remain limited. For the most part, the same actors we have always tracked are behaving in the same manner they did prior to the crisis. There are some new challenges, but they are perceptible, and we—and our customers—are prepared to conti...
https://www.fireeye.com/blog/threat-research/2020/04/limited-shifts-in-cyber-threat-landscape-driven-by-covid-19.html   
Published: 2020 04 08 16:15:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Limited Shifts in the Cyber Threat Landscape Driven by COVID-19 - published over 4 years ago.
Content: Though COVID-19 has had enormous effects on our society and economy, its effects on the cyber threat landscape remain limited. For the most part, the same actors we have always tracked are behaving in the same manner they did prior to the crisis. There are some new challenges, but they are perceptible, and we—and our customers—are prepared to conti...
https://www.fireeye.com/blog/threat-research/2020/04/limited-shifts-in-cyber-threat-landscape-driven-by-covid-19.html   
Published: 2020 04 08 16:15:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: FLARE IDA Pro Script Series: MSDN Annotations Plugin for Malware Analysis - published about 10 years ago.
Content: The FireEye Labs Advanced Reverse Engineering (FLARE) Team continues to share knowledge and tools with the community. We started this blog series with a script for Automatic Recovery of Constructed Strings in Malware. As always, you can download these scripts at the following location: https://github.com/fireeye/flare-ida. We hope you find all th...
https://www.fireeye.com/blog/threat-research/2014/09/flare-ida-pro-script-series-msdn-annotations-ida-pro-for-malware-analysis.html   
Published: 2014 09 11 22:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: FLARE IDA Pro Script Series: MSDN Annotations Plugin for Malware Analysis - published about 10 years ago.
Content: The FireEye Labs Advanced Reverse Engineering (FLARE) Team continues to share knowledge and tools with the community. We started this blog series with a script for Automatic Recovery of Constructed Strings in Malware. As always, you can download these scripts at the following location: https://github.com/fireeye/flare-ida. We hope you find all th...
https://www.fireeye.com/blog/threat-research/2014/09/flare-ida-pro-script-series-msdn-annotations-ida-pro-for-malware-analysis.html   
Published: 2014 09 11 22:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: iBackDoor: High-Risk Code Hits iOS Apps - published about 9 years ago.
Content: Introduction FireEye mobile researchers recently discovered potentially “backdoored” versions of an ad library embedded in thousands of iOS apps originally published in the Apple App Store. The affected versions of this library embedded functionality in iOS apps that used the library to display ads, allowing for potential malicious access to se...
https://www.fireeye.com/blog/threat-research/2015/11/ibackdoor_high-risk.html   
Published: 2015 11 04 18:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: iBackDoor: High-Risk Code Hits iOS Apps - published about 9 years ago.
Content: Introduction FireEye mobile researchers recently discovered potentially “backdoored” versions of an ad library embedded in thousands of iOS apps originally published in the Apple App Store. The affected versions of this library embedded functionality in iOS apps that used the library to display ads, allowing for potential malicious access to se...
https://www.fireeye.com/blog/threat-research/2015/11/ibackdoor_high-risk.html   
Published: 2015 11 04 18:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Maimed Ramnit Still Lurking in the Shadow - published almost 9 years ago.
Content: Newspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from waiting on the newspaper delivery boy to reading breaking news on ePapers, we lose the subtle art of bug squashing. Instead, we end up exposing ourselves to dangerous digital bugs that can affect our virtual ...
https://www.fireeye.com/blog/threat-research/2016/02/maimed_ramnit_still.html   
Published: 2016 02 18 17:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Maimed Ramnit Still Lurking in the Shadow - published almost 9 years ago.
Content: Newspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from waiting on the newspaper delivery boy to reading breaking news on ePapers, we lose the subtle art of bug squashing. Instead, we end up exposing ourselves to dangerous digital bugs that can affect our virtual ...
https://www.fireeye.com/blog/threat-research/2016/02/maimed_ramnit_still.html   
Published: 2016 02 18 17:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Havex, It’s Down With OPC - published over 10 years ago.
Content: FireEye recently analyzed the capabilities of a variant of Havex (referred to by FireEye as “Fertger” or “PEACEPIPE”), the first publicized malware reported to actively scan OPC servers used for controlling SCADA (Supervisory Control and Data Acquisition) devices in critical infrastructure (e.g., water and electric utilities), energy, and manufactu...
https://www.fireeye.com/blog/threat-research/2014/07/havex-its-down-with-opc.html   
Published: 2014 07 17 14:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Havex, It’s Down With OPC - published over 10 years ago.
Content: FireEye recently analyzed the capabilities of a variant of Havex (referred to by FireEye as “Fertger” or “PEACEPIPE”), the first publicized malware reported to actively scan OPC servers used for controlling SCADA (Supervisory Control and Data Acquisition) devices in critical infrastructure (e.g., water and electric utilities), energy, and manufactu...
https://www.fireeye.com/blog/threat-research/2014/07/havex-its-down-with-opc.html   
Published: 2014 07 17 14:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: IRONGATE ICS Malware: Nothing to See Here...Masking Malicious Activity on SCADA Systems - published over 8 years ago.
Content: In the latter half of 2015, the FireEye Labs Advanced Reverse Engineering (FLARE) team identified several versions of an ICS-focused malware crafted to manipulate a specific industrial process running within a simulated Siemens control system environment. We named this family of malware IRONGATE. FLARE found the samples on VirusTotal while researchi...
https://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html   
Published: 2016 06 02 12:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: IRONGATE ICS Malware: Nothing to See Here...Masking Malicious Activity on SCADA Systems - published over 8 years ago.
Content: In the latter half of 2015, the FireEye Labs Advanced Reverse Engineering (FLARE) team identified several versions of an ICS-focused malware crafted to manipulate a specific industrial process running within a simulated Siemens control system environment. We named this family of malware IRONGATE. FLARE found the samples on VirusTotal while researchi...
https://www.fireeye.com/blog/threat-research/2016/06/irongate_ics_malware.html   
Published: 2016 06 02 12:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Rotten Apples: Resurgence - published about 8 years ago.
Content: In June 2016, we published a blog about a phishing campaign targeting the Apple IDs and passwords of Chinese Apple users that emerged in the first quarter of 2016 (referred to as the “Zycode” phishing campaign). At FireEye Labs we have an automated system designed to proactively detect newly registered malicious domains and this system had observed ...
https://www.fireeye.com/blog/threat-research/2016/10/rotten_apples_resur.html   
Published: 2016 10 20 12:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Rotten Apples: Resurgence - published about 8 years ago.
Content: In June 2016, we published a blog about a phishing campaign targeting the Apple IDs and passwords of Chinese Apple users that emerged in the first quarter of 2016 (referred to as the “Zycode” phishing campaign). At FireEye Labs we have an automated system designed to proactively detect newly registered malicious domains and this system had observed ...
https://www.fireeye.com/blog/threat-research/2016/10/rotten_apples_resur.html   
Published: 2016 10 20 12:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: ‘One-Stop Shop’ – Phishing Domain Targets Information from Customers of Several Indian Banks - published almost 8 years ago.
Content: FireEye Labs recently discovered a malicious phishing domain designed to steal a variety of information – including credentials and mobile numbers – from customers of several banks in India. Currently, we have not observed this domain being used in any campaigns. The phishing websites appear to be in the earlier stages of development and through th...
https://www.fireeye.com/blog/threat-research/2016/11/one-stop-shop-phishing-domain.html   
Published: 2016 11 30 17:13:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: ‘One-Stop Shop’ – Phishing Domain Targets Information from Customers of Several Indian Banks - published almost 8 years ago.
Content: FireEye Labs recently discovered a malicious phishing domain designed to steal a variety of information – including credentials and mobile numbers – from customers of several banks in India. Currently, we have not observed this domain being used in any campaigns. The phishing websites appear to be in the earlier stages of development and through th...
https://www.fireeye.com/blog/threat-research/2016/11/one-stop-shop-phishing-domain.html   
Published: 2016 11 30 17:13:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Credit Card Data and Other Information Targeted in Netflix Phishing Campaign - published almost 8 years ago.
Content: Introduction Through FireEye’s Email Threat Prevention (ETP) solution, FireEye Labs discovered a phishing campaign in the wild targeting the credit card data and other personal information of Netflix users primarily based in the United States. This campaign is interesting because of the evasion techniques that were used by the attackers: The phis...
https://www.fireeye.com/blog/threat-research/2017/01/credit_card_dataand.html   
Published: 2017 01 09 16:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Credit Card Data and Other Information Targeted in Netflix Phishing Campaign - published almost 8 years ago.
Content: Introduction Through FireEye’s Email Threat Prevention (ETP) solution, FireEye Labs discovered a phishing campaign in the wild targeting the credit card data and other personal information of Netflix users primarily based in the United States. This campaign is interesting because of the evasion techniques that were used by the attackers: The phis...
https://www.fireeye.com/blog/threat-research/2017/01/credit_card_dataand.html   
Published: 2017 01 09 16:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cerber: Analyzing a Ransomware Attack Methodology To Enable Protection - published over 8 years ago.
Content: Ransomware is a common method of cyber extortion for financial gain that typically involves users being unable to interact with their files, applications or systems until a ransom is paid. Accessibility of cryptocurrency such as Bitcoin has directly contributed to this ransomware model. Based on data from FireEye Dynamic Threat Intelligence (DTI), ...
https://www.fireeye.com/blog/threat-research/2016/07/cerber-ransomware-attack.html   
Published: 2016 07 18 12:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Cerber: Analyzing a Ransomware Attack Methodology To Enable Protection - published over 8 years ago.
Content: Ransomware is a common method of cyber extortion for financial gain that typically involves users being unable to interact with their files, applications or systems until a ransom is paid. Accessibility of cryptocurrency such as Bitcoin has directly contributed to this ransomware model. Based on data from FireEye Dynamic Threat Intelligence (DTI), ...
https://www.fireeye.com/blog/threat-research/2016/07/cerber-ransomware-attack.html   
Published: 2016 07 18 12:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: The 2013 FireEye Advanced Threat Report! - published over 10 years ago.
Content: FireEye has just released its 2013 Advanced Threat Report (ATR), which provides a high-level overview of the computer network attacks that FireEye discovered last year. In this ATR, we focused almost exclusively on a small, but very important subset of our overall data analysis – the advanced persistent threat (APT). APTs, due to their organization...
https://www.fireeye.com/blog/threat-research/2014/02/the-2013-fireeye-advanced-threat-report.html   
Published: 2014 02 27 14:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: The 2013 FireEye Advanced Threat Report! - published over 10 years ago.
Content: FireEye has just released its 2013 Advanced Threat Report (ATR), which provides a high-level overview of the computer network attacks that FireEye discovered last year. In this ATR, we focused almost exclusively on a small, but very important subset of our overall data analysis – the advanced persistent threat (APT). APTs, due to their organization...
https://www.fireeye.com/blog/threat-research/2014/02/the-2013-fireeye-advanced-threat-report.html   
Published: 2014 02 27 14:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: A Not-So Civic Duty: Asprox Botnet Campaign Spreads Court Dates and Malware - published over 10 years ago.
Content: Executive Summary FireEye Labs has been tracking a recent spike in malicious email detections that we attribute to a campaign that began in 2013. While malicious email campaigns are nothing new, this one is significant in that we are observing mass-targeting attackers adopting the malware evasion methods pioneered by the stealthier APT attackers....
https://www.fireeye.com/blog/threat-research/2014/06/a-not-so-civic-duty-asprox-botnet-campaign-spreads-court-dates-and-malware.html   
Published: 2014 06 16 14:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: A Not-So Civic Duty: Asprox Botnet Campaign Spreads Court Dates and Malware - published over 10 years ago.
Content: Executive Summary FireEye Labs has been tracking a recent spike in malicious email detections that we attribute to a campaign that began in 2013. While malicious email campaigns are nothing new, this one is significant in that we are observing mass-targeting attackers adopting the malware evasion methods pioneered by the stealthier APT attackers....
https://www.fireeye.com/blog/threat-research/2014/06/a-not-so-civic-duty-asprox-botnet-campaign-spreads-court-dates-and-malware.html   
Published: 2014 06 16 14:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Using Speakeasy Emulation Framework Programmatically to Unpack Malware - published almost 4 years ago.
Content: Andrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post focused on using Speakeasy as an automated malware sandbox of sorts, this entry will highlight another powerful use of the framework: automated malware unpacking. I will demonstrate, with code exampl...
https://www.fireeye.com/blog/threat-research/2020/12/using-speakeasy-emulation-framework-programmatically-to-unpack-malware.html   
Published: 2020 12 01 20:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Using Speakeasy Emulation Framework Programmatically to Unpack Malware - published almost 4 years ago.
Content: Andrew Davis recently announced the public release of his new Windows emulation framework named Speakeasy. While the introductory blog post focused on using Speakeasy as an automated malware sandbox of sorts, this entry will highlight another powerful use of the framework: automated malware unpacking. I will demonstrate, with code exampl...
https://www.fireeye.com/blog/threat-research/2020/12/using-speakeasy-emulation-framework-programmatically-to-unpack-malware.html   
Published: 2020 12 01 20:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Emulation of Kernel Mode Rootkits With Speakeasy - published almost 4 years ago.
Content: In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you haven’t had a chance, give the post a read today. In addition to user mode emulation, Speakeasy also supports emulation of kernel mode Windows binaries. When malware authors employ kernel mode mal...
https://www.fireeye.com/blog/threat-research/2021/01/emulation-of-kernel-mode-rootkits-with-speakeasy.html   
Published: 2021 01 20 16:45:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Emulation of Kernel Mode Rootkits With Speakeasy - published almost 4 years ago.
Content: In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you haven’t had a chance, give the post a read today. In addition to user mode emulation, Speakeasy also supports emulation of kernel mode Windows binaries. When malware authors employ kernel mode mal...
https://www.fireeye.com/blog/threat-research/2021/01/emulation-of-kernel-mode-rootkits-with-speakeasy.html   
Published: 2021 01 20 16:45:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction - published almost 4 years ago.
Content: Highlights        Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect malicious URLs under multiple training regimes Compare our model against other deep learning methods, and show it performs on-par with other top-scoring models Identify issues with applying generative p...
https://www.fireeye.com/blog/threat-research/2021/01/training-transformers-for-cyber-security-tasks-malicious-url-prediction.html   
Published: 2021 01 21 17:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction - published almost 4 years ago.
Content: Highlights        Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect malicious URLs under multiple training regimes Compare our model against other deep learning methods, and show it performs on-par with other top-scoring models Identify issues with applying generative p...
https://www.fireeye.com/blog/threat-research/2021/01/training-transformers-for-cyber-security-tasks-malicious-url-prediction.html   
Published: 2021 01 21 17:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication - published almost 4 years ago.
Content: FireEye Email Security recently encountered various phishing campaigns, mostly in the Americas and Europe, using source code obfuscation with compromised or bad domains. These domains were masquerading as authentic websites and stole personal information such as credit card data. The stolen information was then shared to cross-platform, cloud-bas...
https://www.fireeye.com/blog/threat-research/2021/01/phishing-campaign-woff-obfuscation-telegram-communications.html   
Published: 2021 01 26 20:45:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication - published almost 4 years ago.
Content: FireEye Email Security recently encountered various phishing campaigns, mostly in the Americas and Europe, using source code obfuscation with compromised or bad domains. These domains were masquerading as authentic websites and stole personal information such as credit card data. The stolen information was then shared to cross-platform, cloud-bas...
https://www.fireeye.com/blog/threat-research/2021/01/phishing-campaign-woff-obfuscation-telegram-communications.html   
Published: 2021 01 26 20:45:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Fuzzing Image Parsing in Windows, Part Two: Uninitialized Memory - published over 3 years ago.
Content: Continuing our discussion of image parsing vulnerabilities in Windows, we take a look at a comparatively less popular vulnerability class: uninitialized memory. In this post, we will look at Windows’ inbuilt image parsers—specifically for vulnerabilities involving the use of uninitialized memory. The Vulnerability: Uninitialized Memory In unman...
https://www.fireeye.com/blog/threat-research/2021/03/fuzzing-image-parsing-in-windows-uninitialized-memory.html   
Published: 2021 03 03 19:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Fuzzing Image Parsing in Windows, Part Two: Uninitialized Memory - published over 3 years ago.
Content: Continuing our discussion of image parsing vulnerabilities in Windows, we take a look at a comparatively less popular vulnerability class: uninitialized memory. In this post, we will look at Windows’ inbuilt image parsers—specifically for vulnerabilities involving the use of uninitialized memory. The Vulnerability: Uninitialized Memory In unman...
https://www.fireeye.com/blog/threat-research/2021/03/fuzzing-image-parsing-in-windows-uninitialized-memory.html   
Published: 2021 03 03 19:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: capa 2.0: Better, Faster, Stronger - published over 3 years ago.
Content: We are excited to announce version 2.0 of our open-source tool called capa. capa automatically identifies capabilities in programs using an extensible rule set. The tool supports both malware triage and deep dive reverse engineering. If you haven’t heard of capa before, or need a refresher, check out our first blog post. You can download capa 2.0...
https://www.fireeye.com/blog/threat-research/2021/07/capa-2-better-stronger-faster.html   
Published: 2021 07 19 18:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: capa 2.0: Better, Faster, Stronger - published over 3 years ago.
Content: We are excited to announce version 2.0 of our open-source tool called capa. capa automatically identifies capabilities in programs using an extensible rule set. The tool supports both malware triage and deep dive reverse engineering. If you haven’t heard of capa before, or need a refresher, check out our first blog post. You can download capa 2.0...
https://www.fireeye.com/blog/threat-research/2021/07/capa-2-better-stronger-faster.html   
Published: 2021 07 19 18:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Announcing the Eighth Annual Flare-On Challenge - published over 3 years ago.
Content: The FLARE team is once again hosting its annual Flare-On challenge, now in its eighth year. Take this opportunity to enjoy some extreme social distancing by solving fun puzzles to test your mettle and learn new tricks on your path to reverse engineering excellence. The contest will begin at 8:00 p.m. ET on Sept. 10, 2021. This is a CTF-style cha...
https://www.fireeye.com/blog/threat-research/2021/08/announcing-the-eighth-annual-flare-on-challenge.html   
Published: 2021 08 12 15:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Announcing the Eighth Annual Flare-On Challenge - published over 3 years ago.
Content: The FLARE team is once again hosting its annual Flare-On challenge, now in its eighth year. Take this opportunity to enjoy some extreme social distancing by solving fun puzzles to test your mettle and learn new tricks on your path to reverse engineering excellence. The contest will begin at 8:00 p.m. ET on Sept. 10, 2021. This is a CTF-style cha...
https://www.fireeye.com/blog/threat-research/2021/08/announcing-the-eighth-annual-flare-on-challenge.html   
Published: 2021 08 12 15:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: ELFant in the Room – capa v3 - published about 3 years ago.
Content: Since our initial public release of capa, incident responders and reverse engineers have used the tool to automatically identify capabilities in Windows executables. With our newest code and ruleset updates, capa v3 also identifies capabilities in Executable and Linkable Format (ELF) files, such as those used on Linux and other Unix-like operatin...
https://www.fireeye.com/blog/threat-research/2021/09/elfant-in-the-room-capa-v3.html   
Published: 2021 09 15 13:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: ELFant in the Room – capa v3 - published about 3 years ago.
Content: Since our initial public release of capa, incident responders and reverse engineers have used the tool to automatically identify capabilities in Windows executables. With our newest code and ruleset updates, capa v3 also identifies capabilities in Executable and Linkable Format (ELF) files, such as those used on Linux and other Unix-like operatin...
https://www.fireeye.com/blog/threat-research/2021/09/elfant-in-the-room-capa-v3.html   
Published: 2021 09 15 13:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Going To Ground with The Windows Scripting Host (WSH) - published almost 11 years ago.
Content: About a month ago, I was involved in an investigation that revealed a targeted attacker using an interesting variation of a well-known persistence mechanism - a technique that is relevant both to incident responders hunting for evil and penetration testers looking to add post-exploitation methods to their toolkit. Today, I'm going to t...
https://www.fireeye.com/blog/threat-research/2014/02/ground-windows-scripting-host-wsh.html   
Published: 2014 02 19 21:56:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Going To Ground with The Windows Scripting Host (WSH) - published almost 11 years ago.
Content: About a month ago, I was involved in an investigation that revealed a targeted attacker using an interesting variation of a well-known persistence mechanism - a technique that is relevant both to incident responders hunting for evil and penetration testers looking to add post-exploitation methods to their toolkit. Today, I'm going to t...
https://www.fireeye.com/blog/threat-research/2014/02/ground-windows-scripting-host-wsh.html   
Published: 2014 02 19 21:56:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: New Zero-Day Exploit targeting Internet Explorer Versions 9 through 11 Identified in Targeted Attacks - published over 10 years ago.
Content: Summary FireEye Research Labs, the intelligence behind our Mandiant Consultancy services, identified a new Internet Explorer (IE) zero-day exploit used in targeted attacks.  The vulnerability affects IE6 through IE11, but the attack is targeting IE9 through IE11.  This zero-day bypasses both ASLR and DEP. Microsoft has assigned CVE-2014-1776 to...
https://www.fireeye.com/blog/threat-research/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html   
Published: 2014 04 27 02:29:08
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: New Zero-Day Exploit targeting Internet Explorer Versions 9 through 11 Identified in Targeted Attacks - published over 10 years ago.
Content: Summary FireEye Research Labs, the intelligence behind our Mandiant Consultancy services, identified a new Internet Explorer (IE) zero-day exploit used in targeted attacks.  The vulnerability affects IE6 through IE11, but the attack is targeting IE9 through IE11.  This zero-day bypasses both ASLR and DEP. Microsoft has assigned CVE-2014-1776 to...
https://www.fireeye.com/blog/threat-research/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html   
Published: 2014 04 27 02:29:08
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Surge in Spam Campaign Delivering Locky Ransomware Downloaders - published over 8 years ago.
Content: FireEye Labs is detecting a significant spike in Locky ransomware downloaders due to a pair of concurrent email spam campaigns impacting users in over 50 countries. Some of the top affected countries are depicted in Figure 1. Figure 1. Affected countries As seen in Figure 2, the steep spike starts on March 21, 2016, where Locky is running cam...
https://www.fireeye.com/blog/threat-research/2016/03/surge_in_spam_campai.html   
Published: 2016 03 25 12:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Surge in Spam Campaign Delivering Locky Ransomware Downloaders - published over 8 years ago.
Content: FireEye Labs is detecting a significant spike in Locky ransomware downloaders due to a pair of concurrent email spam campaigns impacting users in over 50 countries. Some of the top affected countries are depicted in Figure 1. Figure 1. Affected countries As seen in Figure 2, the steep spike starts on March 21, 2016, where Locky is running cam...
https://www.fireeye.com/blog/threat-research/2016/03/surge_in_spam_campai.html   
Published: 2016 03 25 12:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Extending Linux Executable Logging With The Integrity Measurement Architecture - published about 8 years ago.
Content: Gaining insight into the files being executed on your system is a great first step towards improved visibility on your endpoints. Taking this a step further, centrally storing logs of file execution data so they can be used for detection and hunting provides an excellent opportunity to find evil on your network. A SIEM, and to some degree your entir...
https://www.fireeye.com/blog/threat-research/2016/11/extending_linux_exec.html   
Published: 2016 11 09 13:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Extending Linux Executable Logging With The Integrity Measurement Architecture - published about 8 years ago.
Content: Gaining insight into the files being executed on your system is a great first step towards improved visibility on your endpoints. Taking this a step further, centrally storing logs of file execution data so they can be used for detection and hunting provides an excellent opportunity to find evil on your network. A SIEM, and to some degree your entir...
https://www.fireeye.com/blog/threat-research/2016/11/extending_linux_exec.html   
Published: 2016 11 09 13:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: FLARE Script Series: Recovering Stackstrings Using Emulation with ironstrings - published over 5 years ago.
Content: This blog post continues our Script Series where the FireEye Labs Advanced Reverse Engineering (FLARE) team shares tools to aid the malware analysis community. Today, we release ironstrings: a new IDAPython script to recover stackstrings from malware. The script leverages code emulation to overcome this common string obfuscation technique. More preci...
https://www.fireeye.com/blog/threat-research/2019/02/recovering-stackstrings-using-emulation-with-ironstrings.html   
Published: 2019 02 28 16:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: FLARE Script Series: Recovering Stackstrings Using Emulation with ironstrings - published over 5 years ago.
Content: This blog post continues our Script Series where the FireEye Labs Advanced Reverse Engineering (FLARE) team shares tools to aid the malware analysis community. Today, we release ironstrings: a new IDAPython script to recover stackstrings from malware. The script leverages code emulation to overcome this common string obfuscation technique. More preci...
https://www.fireeye.com/blog/threat-research/2019/02/recovering-stackstrings-using-emulation-with-ironstrings.html   
Published: 2019 02 28 16:30:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Bypassing Antivirus for Your Antivirus Bypass - published about 6 years ago.
Content: Chances are you have heard about how easy it can be to evade antivirus. Often, this is because the signatures used by vendors are too simplistic and can be successfully duped without changing the functionality of the malware. Have you ever attempted to evade AV? Is it really that easy? In this blog post, I’ll show you how I adapted “malicious” (not...
https://www.fireeye.com/blog/threat-research/2018/09/bypassing-antivirus-for-your-antivirus-bypass.html   
Published: 2018 09 13 23:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Bypassing Antivirus for Your Antivirus Bypass - published about 6 years ago.
Content: Chances are you have heard about how easy it can be to evade antivirus. Often, this is because the signatures used by vendors are too simplistic and can be successfully duped without changing the functionality of the malware. Have you ever attempted to evade AV? Is it really that easy? In this blog post, I’ll show you how I adapted “malicious” (not...
https://www.fireeye.com/blog/threat-research/2018/09/bypassing-antivirus-for-your-antivirus-bypass.html   
Published: 2018 09 13 23:00:00
Received: 2022 05 23 16:06:45
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: CISA Adds 21 Known Exploited Vulnerabilities to Catalog - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/05/23/cisa-adds-21-known-exploited-vulnerabilities-catalog   
Published: 2022 05 23 15:00:00
Received: 2022 05 23 16:02:22
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: CISA Adds 21 Known Exploited Vulnerabilities to Catalog - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/05/23/cisa-adds-21-known-exploited-vulnerabilities-catalog   
Published: 2022 05 23 15:00:00
Received: 2022 05 23 16:02:22
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Mozilla Releases Security Products for Multiple Firefox Products - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/05/23/mozilla-releases-security-products-multiple-firefox-products   
Published: 2022 05 23 15:30:00
Received: 2022 05 23 16:02:22
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Article: Mozilla Releases Security Products for Multiple Firefox Products - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/05/23/mozilla-releases-security-products-multiple-firefox-products   
Published: 2022 05 23 15:30:00
Received: 2022 05 23 16:02:22
Feed: CISA Current Activity
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Football fans: be cautious of bogus play-off tickets online - published over 2 years ago.
Content: Two of our region’s football teams are visiting Wembley Stadium this weekend in two separate EFL play-off finals…and we don’t want fans to become a victim of ticket fraud. For Nottingham Forest and Mansfield Town supporters, next weekend is huge. First up, on Saturday, Mansfield Town take on Port Vale in the League Two play-off final for a chance to be promo...
https://www.emcrc.co.uk/post/football-fans-be-cautious-of-bogus-play-off-tickets-online   
Published: 2022 05 23 15:34:11
Received: 2022 05 23 15:49:22
Feed: The Cyber Resilience Centre for the East Midlands
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: Football fans: be cautious of bogus play-off tickets online - published over 2 years ago.
Content: Two of our region’s football teams are visiting Wembley Stadium this weekend in two separate EFL play-off finals…and we don’t want fans to become a victim of ticket fraud. For Nottingham Forest and Mansfield Town supporters, next weekend is huge. First up, on Saturday, Mansfield Town take on Port Vale in the League Two play-off final for a chance to be promo...
https://www.emcrc.co.uk/post/football-fans-be-cautious-of-bogus-play-off-tickets-online   
Published: 2022 05 23 15:34:11
Received: 2022 05 23 15:49:22
Feed: The Cyber Resilience Centre for the East Midlands
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: Apple CEO Tim Cook Earns Spot on TIME's List of 100 Most Influential People of 2022 - published over 2 years ago.
Content:
https://www.macrumors.com/2022/05/23/apple-ceo-tim-cook-times-list/   
Published: 2022 05 23 15:27:28
Received: 2022 05 23 15:48:26
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple CEO Tim Cook Earns Spot on TIME's List of 100 Most Influential People of 2022 - published over 2 years ago.
Content:
https://www.macrumors.com/2022/05/23/apple-ceo-tim-cook-times-list/   
Published: 2022 05 23 15:27:28
Received: 2022 05 23 15:48:26
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of May 16, 2022 - published over 2 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/vert-cybersecurity-news-may-16-2022/   
Published: 2022 05 23 15:43:43
Received: 2022 05 23 15:45:50
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Article: Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of May 16, 2022 - published over 2 years ago.
Content:
https://www.tripwire.com/state-of-security/featured/vert-cybersecurity-news-may-16-2022/   
Published: 2022 05 23 15:43:43
Received: 2022 05 23 15:45:50
Feed: The State of Security
Source: The State of Security
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: New ransomware demands victims to donate to poor | The Independent - published over 2 years ago.
Content: The GoodWill ransomware was first identified by cyber security firm CloudSEK in March 2022, with attackers appearing to be motivated by social ...
https://www.independent.co.uk/tech/ransomware-goodwill-cyber-security-cloudsec-b2085089.html   
Published: 2022 05 23 14:21:04
Received: 2022 05 23 15:41:33
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: New ransomware demands victims to donate to poor | The Independent - published over 2 years ago.
Content: The GoodWill ransomware was first identified by cyber security firm CloudSEK in March 2022, with attackers appearing to be motivated by social ...
https://www.independent.co.uk/tech/ransomware-goodwill-cyber-security-cloudsec-b2085089.html   
Published: 2022 05 23 14:21:04
Received: 2022 05 23 15:41:33
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Reskilling workers can help meet the cybersecurity staffing challenge | Security Magazine - published over 2 years ago.
Content: Vishal Salvi is Senior Vice President, Chief Information Security Officer and Head of the Cyber Security Practice at Infosys.
https://www.securitymagazine.com/articles/97669-reskilling-workers-can-help-meet-the-cybersecurity-staffing-challenge   
Published: 2022 05 23 14:36:21
Received: 2022 05 23 15:41:33
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Reskilling workers can help meet the cybersecurity staffing challenge | Security Magazine - published over 2 years ago.
Content: Vishal Salvi is Senior Vice President, Chief Information Security Officer and Head of the Cyber Security Practice at Infosys.
https://www.securitymagazine.com/articles/97669-reskilling-workers-can-help-meet-the-cybersecurity-staffing-challenge   
Published: 2022 05 23 14:36:21
Received: 2022 05 23 15:41:33
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Can the new National Cyber Strategy make the UK a security leader? - Raconteur - published over 2 years ago.
Content: This change in tack is one that David Woodfine, managing director of Cyber Security Associates, welcomes. “People mistakenly think cyber is all about ...
https://www.raconteur.net/technology/can-the-new-national-cyber-strategy-make-the-uk-a-security-leader/   
Published: 2022 05 23 14:56:51
Received: 2022 05 23 15:41:33
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Can the new National Cyber Strategy make the UK a security leader? - Raconteur - published over 2 years ago.
Content: This change in tack is one that David Woodfine, managing director of Cyber Security Associates, welcomes. “People mistakenly think cyber is all about ...
https://www.raconteur.net/technology/can-the-new-national-cyber-strategy-make-the-uk-a-security-leader/   
Published: 2022 05 23 14:56:51
Received: 2022 05 23 15:41:33
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Directors polled on cyber - Professional Security Magazine - published over 2 years ago.
Content: Many businesses are taking cyber security seriously. However, a higher level of awareness and expertise is needed on boards of directors in view ...
https://www.professionalsecurity.co.uk/news/commercial-security/directors-polled-on-cyber/   
Published: 2022 05 23 15:32:23
Received: 2022 05 23 15:41:33
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Directors polled on cyber - Professional Security Magazine - published over 2 years ago.
Content: Many businesses are taking cyber security seriously. However, a higher level of awareness and expertise is needed on boards of directors in view ...
https://www.professionalsecurity.co.uk/news/commercial-security/directors-polled-on-cyber/   
Published: 2022 05 23 15:32:23
Received: 2022 05 23 15:41:33
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Jeffrey Aguilar named Los Angeles County CISO - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97671-jeffrey-aguilar-named-los-angeles-county-ciso   
Published: 2022 05 23 14:02:40
Received: 2022 05 23 15:22:11
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Jeffrey Aguilar named Los Angeles County CISO - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97671-jeffrey-aguilar-named-los-angeles-county-ciso   
Published: 2022 05 23 14:02:40
Received: 2022 05 23 15:22:11
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Yes, Containers Are Terrific, But Watch the Security Risks - published over 2 years ago.
Content:
https://thehackernews.com/2022/05/yes-containers-are-terrific-but-watch.html   
Published: 2022 05 23 15:02:47
Received: 2022 05 23 15:21:53
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Article: Yes, Containers Are Terrific, But Watch the Security Risks - published over 2 years ago.
Content:
https://thehackernews.com/2022/05/yes-containers-are-terrific-but-watch.html   
Published: 2022 05 23 15:02:47
Received: 2022 05 23 15:21:53
Feed: The Hacker News
Source: The Hacker News
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Jeffrey Aguilar named Los Angeles County CISO - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97671-jeffrey-aguilar-named-los-angeles-county-ciso   
Published: 2022 05 23 14:02:40
Received: 2022 05 23 15:21:49
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Jeffrey Aguilar named Los Angeles County CISO - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97671-jeffrey-aguilar-named-los-angeles-county-ciso   
Published: 2022 05 23 14:02:40
Received: 2022 05 23 15:21:49
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Cyber bills gain ground on Capitol Hill - Politico - published over 2 years ago.
Content: — Russian President Vladimir Putin's call for strengthening cybersecurity after a series of retaliatory cyberattacks could be a screen to cover up ...
https://www.politico.com/newsletters/weekly-cybersecurity/2022/05/23/cyber-bills-gain-ground-on-capitol-hill-00034321   
Published: 2022 05 23 14:09:02
Received: 2022 05 23 15:21:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cyber bills gain ground on Capitol Hill - Politico - published over 2 years ago.
Content: — Russian President Vladimir Putin's call for strengthening cybersecurity after a series of retaliatory cyberattacks could be a screen to cover up ...
https://www.politico.com/newsletters/weekly-cybersecurity/2022/05/23/cyber-bills-gain-ground-on-capitol-hill-00034321   
Published: 2022 05 23 14:09:02
Received: 2022 05 23 15:21:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Swiss govt reinforces cybersecurity strategy - Telecompaper - published over 2 years ago.
Content: The positions are distributed between the National Cybersecurity Centre, the Federal Intelligence Service, the Federal Office of Information ...
https://www.telecompaper.com/news/swiss-govt-reinforces-cybersecurity-strategy--1425285   
Published: 2022 05 23 14:41:27
Received: 2022 05 23 15:21:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Swiss govt reinforces cybersecurity strategy - Telecompaper - published over 2 years ago.
Content: The positions are distributed between the National Cybersecurity Centre, the Federal Intelligence Service, the Federal Office of Information ...
https://www.telecompaper.com/news/swiss-govt-reinforces-cybersecurity-strategy--1425285   
Published: 2022 05 23 14:41:27
Received: 2022 05 23 15:21:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Can the new National Cyber Strategy make the UK a security leader? - Raconteur - published over 2 years ago.
Content: Cybersecurity involves people, processes, culture and society. By focusing on the cyber ecosystem of the UK, we're not just relying on the big ...
https://www.raconteur.net/technology/can-the-new-national-cyber-strategy-make-the-uk-a-security-leader/   
Published: 2022 05 23 14:56:51
Received: 2022 05 23 15:21:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Can the new National Cyber Strategy make the UK a security leader? - Raconteur - published over 2 years ago.
Content: Cybersecurity involves people, processes, culture and society. By focusing on the cyber ecosystem of the UK, we're not just relying on the big ...
https://www.raconteur.net/technology/can-the-new-national-cyber-strategy-make-the-uk-a-security-leader/   
Published: 2022 05 23 14:56:51
Received: 2022 05 23 15:21:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: We must close the cybersecurity skills gap - Dhaka Tribune - published over 2 years ago.
Content: There is a continued high demand for cybersecurity professionals and an ongoing shortage of talent.
https://www.dhakatribune.com/business/2022/05/23/we-must-close-the-cybersecurity-skills-gap   
Published: 2022 05 23 15:03:03
Received: 2022 05 23 15:21:38
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: We must close the cybersecurity skills gap - Dhaka Tribune - published over 2 years ago.
Content: There is a continued high demand for cybersecurity professionals and an ongoing shortage of talent.
https://www.dhakatribune.com/business/2022/05/23/we-must-close-the-cybersecurity-skills-gap   
Published: 2022 05 23 15:03:03
Received: 2022 05 23 15:21:38
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Managed Security Services Provider (MSSP) Market News: 23 May 2022 - published over 2 years ago.
Content: Cybersecurity Maturity Model Certification (CMMC): CyberSheath, a CMMC managed service provider supporting the DIB (Defense Industrial Base, has ...
https://www.msspalert.com/cybersecurity-news/updates-23-may-2022/   
Published: 2022 05 23 15:09:16
Received: 2022 05 23 15:21:38
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Managed Security Services Provider (MSSP) Market News: 23 May 2022 - published over 2 years ago.
Content: Cybersecurity Maturity Model Certification (CMMC): CyberSheath, a CMMC managed service provider supporting the DIB (Defense Industrial Base, has ...
https://www.msspalert.com/cybersecurity-news/updates-23-may-2022/   
Published: 2022 05 23 15:09:16
Received: 2022 05 23 15:21:38
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Deals: Amazon Discounting Apple's MagSafe Charger, Duo Charger, and Battery Pack - published over 2 years ago.
Content:
https://www.macrumors.com/2022/05/23/deals-amazon-magsafe-charger/   
Published: 2022 05 23 15:03:44
Received: 2022 05 23 15:09:33
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Deals: Amazon Discounting Apple's MagSafe Charger, Duo Charger, and Battery Pack - published over 2 years ago.
Content:
https://www.macrumors.com/2022/05/23/deals-amazon-magsafe-charger/   
Published: 2022 05 23 15:03:44
Received: 2022 05 23 15:09:33
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Yes, Containers Are Terrific, But Watch the Security Risks - published over 2 years ago.
Content:
https://thehackernews.com/2022/05/yes-containers-are-terrific-but-watch.html   
Published: 2022 05 23 15:02:47
Received: 2022 05 23 15:07:05
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Yes, Containers Are Terrific, But Watch the Security Risks - published over 2 years ago.
Content:
https://thehackernews.com/2022/05/yes-containers-are-terrific-but-watch.html   
Published: 2022 05 23 15:02:47
Received: 2022 05 23 15:07:05
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Attacker Scanning for jQuery-File-Upload, (Mon, May 23rd) - published over 2 years ago.
Content: Recently, I noticed some requests hitting our honeypots that appear to attempt to exploit jQuery-File-Upload. jQuery-File-Upload is a popular tool for implementing file uploads. It has been around for a while and has had a few vulnerabilities in the past, but nothing recent as far as I can tell [1]. Allowing users to upload files securely is tricky. And jQue...
https://isc.sans.edu/diary/rss/28674   
Published: 2022 05 23 13:35:52
Received: 2022 05 23 15:03:18
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Article: Attacker Scanning for jQuery-File-Upload, (Mon, May 23rd) - published over 2 years ago.
Content: Recently, I noticed some requests hitting our honeypots that appear to attempt to exploit jQuery-File-Upload. jQuery-File-Upload is a popular tool for implementing file uploads. It has been around for a while and has had a few vulnerabilities in the past, but nothing recent as far as I can tell [1]. Allowing users to upload files securely is tricky. And jQue...
https://isc.sans.edu/diary/rss/28674   
Published: 2022 05 23 13:35:52
Received: 2022 05 23 15:03:18
Feed: SANS Internet Storm Center, InfoCON: green
Source: SANS Internet Storm Center, InfoCON: green
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Christopher Hoff joins LastPass as Chief Secure Technology Officer - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97672-christopher-hoff-joins-lastpass-as-chief-secure-technology-officer   
Published: 2022 05 23 14:45:00
Received: 2022 05 23 15:02:32
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Christopher Hoff joins LastPass as Chief Secure Technology Officer - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97672-christopher-hoff-joins-lastpass-as-chief-secure-technology-officer   
Published: 2022 05 23 14:45:00
Received: 2022 05 23 15:02:32
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: IIOT and the manufacturing sector, what’s the risk? - published over 2 years ago.
Content: Industrial Internet of Things (IIOT) is increasingly being adopted by the manufacturing sector in response to increasing demand for customisation, customer expectations and the global supply chain.IIOT allows cost reduction, shorter time-to-market, mass customization and improved safety. CGI’s study reports that 62% of surveyed manufacturing enterprises ar...
https://www.ecrcentre.co.uk/post/iiot-and-the-manufacturing-sector-what-s-the-risk   
Published: 2022 05 23 14:30:04
Received: 2022 05 23 14:49:22
Feed: The Eastern Cyber Resilience Centre
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Article: IIOT and the manufacturing sector, what’s the risk? - published over 2 years ago.
Content: Industrial Internet of Things (IIOT) is increasingly being adopted by the manufacturing sector in response to increasing demand for customisation, customer expectations and the global supply chain.IIOT allows cost reduction, shorter time-to-market, mass customization and improved safety. CGI’s study reports that 62% of surveyed manufacturing enterprises ar...
https://www.ecrcentre.co.uk/post/iiot-and-the-manufacturing-sector-what-s-the-risk   
Published: 2022 05 23 14:30:04
Received: 2022 05 23 14:49:22
Feed: The Eastern Cyber Resilience Centre
Source: National Cyber Resilience Centre Group
Category: News
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Kingston Digital Releases Touch-Screen Hardware-Encrypted External SSD for Data Protection - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/kingston-digital-releases-touch-screen-hardware-encrypted-external-ssd-for-data-protection   
Published: 2022 05 23 14:28:54
Received: 2022 05 23 14:48:26
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Kingston Digital Releases Touch-Screen Hardware-Encrypted External SSD for Data Protection - published over 2 years ago.
Content:
https://www.darkreading.com/attacks-breaches/kingston-digital-releases-touch-screen-hardware-encrypted-external-ssd-for-data-protection   
Published: 2022 05 23 14:28:54
Received: 2022 05 23 14:48:26
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Valeo Networks Acquires Next I.T. - published over 2 years ago.
Content:
https://www.darkreading.com/operations/valeo-networks-acquires-next-i-t-   
Published: 2022 05 23 14:31:31
Received: 2022 05 23 14:48:26
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Valeo Networks Acquires Next I.T. - published over 2 years ago.
Content:
https://www.darkreading.com/operations/valeo-networks-acquires-next-i-t-   
Published: 2022 05 23 14:31:31
Received: 2022 05 23 14:48:26
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Webinar: Descubra Data Protector 11.01 & Data Protector for Cloud Workloads | Webinars - published over 2 years ago.
Content: La creciente demanda de talento de DevSecOps · Ciberseguridad inteligencia artificial 5 errores que se cometen al incluir la IA en marketing.
https://discoverthenew.ituser.es/webinars/2022/05/webinar-descubra-data-protector-1101--data-protector-for-cloud-workloads   
Published: 2022 05 23 10:04:32
Received: 2022 05 23 14:28:47
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Webinar: Descubra Data Protector 11.01 & Data Protector for Cloud Workloads | Webinars - published over 2 years ago.
Content: La creciente demanda de talento de DevSecOps · Ciberseguridad inteligencia artificial 5 errores que se cometen al incluir la IA en marketing.
https://discoverthenew.ituser.es/webinars/2022/05/webinar-descubra-data-protector-1101--data-protector-for-cloud-workloads   
Published: 2022 05 23 10:04:32
Received: 2022 05 23 14:28:47
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Six Points to Remember While Developing a SaaS Application | Toolbox Tech - published over 2 years ago.
Content: Why APIs and Microservices Are Vital for Digital Transformation · What Is DevSecOps? Definition, Pipeline, Framework, and Best Practices for 2022.
https://www.toolbox.com/tech/devops/guest-article/six-points-to-remember-while-developing-a-saas-application/   
Published: 2022 05 23 13:28:57
Received: 2022 05 23 14:28:47
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Six Points to Remember While Developing a SaaS Application | Toolbox Tech - published over 2 years ago.
Content: Why APIs and Microservices Are Vital for Digital Transformation · What Is DevSecOps? Definition, Pipeline, Framework, and Best Practices for 2022.
https://www.toolbox.com/tech/devops/guest-article/six-points-to-remember-while-developing-a-saas-application/   
Published: 2022 05 23 13:28:57
Received: 2022 05 23 14:28:47
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps

All Articles

Ordered by Date Received : Year: "2022" Month: "05" Day: "23"
Page: << < 5 (of 10) > >>

Total Articles in this collection: 514


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor