All Articles

Ordered by Date Received : Year: "2022" Month: "05" Day: "23"
Page: << < 3 (of 10) > >>

Total Articles in this collection: 514

Navigation Help at the bottom of the page
Article: Apple Reportedly Talked With Electronic Arts About Potential Acquisition - published over 2 years ago.
Content:
https://www.macrumors.com/2022/05/23/ea-apple-alleged-acquisition-talks/   
Published: 2022 05 23 17:58:24
Received: 2022 05 23 18:09:57
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Apple Reportedly Talked With Electronic Arts About Potential Acquisition - published over 2 years ago.
Content:
https://www.macrumors.com/2022/05/23/ea-apple-alleged-acquisition-talks/   
Published: 2022 05 23 17:58:24
Received: 2022 05 23 18:09:57
Feed: MacRumors : Mac News and Rumors
Source: MacRumors : Mac News and Rumors
Category: News
Topic: Cyber Security
Article: Why the Employee Experience Is Cyber Resilience - published over 2 years ago.
Content:
https://www.darkreading.com/vulnerabilities-threats/why-the-employee-experience-is-cyber-resilience   
Published: 2022 05 23 17:38:14
Received: 2022 05 23 18:09:35
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Article: Why the Employee Experience Is Cyber Resilience - published over 2 years ago.
Content:
https://www.darkreading.com/vulnerabilities-threats/why-the-employee-experience-is-cyber-resilience   
Published: 2022 05 23 17:38:14
Received: 2022 05 23 18:09:35
Feed: Dark Reading:
Source: Dark Reading
Category: News
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: [tool] tplink backup decryptor. - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/May/44   
Published: 2022 05 23 17:37:56
Received: 2022 05 23 18:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: [tool] tplink backup decryptor. - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/May/44   
Published: 2022 05 23 17:37:56
Received: 2022 05 23 18:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Disclosing Vulnerability of CLink Office 2.0 - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/May/45   
Published: 2022 05 23 17:38:18
Received: 2022 05 23 18:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: Disclosing Vulnerability of CLink Office 2.0 - published over 2 years ago.
Content:
https://seclists.org/fulldisclosure/2022/May/45   
Published: 2022 05 23 17:38:18
Received: 2022 05 23 18:03:18
Feed: Full Disclosure
Source: Full Disclosure
Category: Alerts
Topic: Vulnerabilities
Article: CISA outlines 10 initial access points exploited by hackers - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97676-cisa-outlines-10-initial-access-points-exploited-by-hackers   
Published: 2022 05 23 16:39:14
Received: 2022 05 23 18:01:54
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: CISA outlines 10 initial access points exploited by hackers - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97676-cisa-outlines-10-initial-access-points-exploited-by-hackers   
Published: 2022 05 23 16:39:14
Received: 2022 05 23 18:01:54
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Hackers can hack your online accounts before you even register them - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/hackers-can-hack-your-online-accounts-before-you-even-register-them/   
Published: 2022 05 23 17:02:01
Received: 2022 05 23 17:22:08
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: Hackers can hack your online accounts before you even register them - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/hackers-can-hack-your-online-accounts-before-you-even-register-them/   
Published: 2022 05 23 17:02:01
Received: 2022 05 23 17:22:08
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: What is DevSecOps? Shift security left in your DevOps lifecycle - Codacy | Blog - published over 2 years ago.
Content: DevSecOps: what it is, why it is important, its connection with DevOps, and how to put it into practice in your development lifecycle.
https://blog.codacy.com/what-is-devsecops/   
Published: 2022 05 23 13:28:52
Received: 2022 05 23 17:09:41
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: What is DevSecOps? Shift security left in your DevOps lifecycle - Codacy | Blog - published over 2 years ago.
Content: DevSecOps: what it is, why it is important, its connection with DevOps, and how to put it into practice in your development lifecycle.
https://blog.codacy.com/what-is-devsecops/   
Published: 2022 05 23 13:28:52
Received: 2022 05 23 17:09:41
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Four Reasons Why Enterprises Struggle to Deploy DevSecOps - ITSecurityWire - published over 2 years ago.
Content: DevSecOps, automation, DevOps, Infrastructure-as-Code (IaC), Kubernetes, Continuous Integration/Continuous Delivery (CI/CD), Linux Foundation, ...
https://itsecuritywire.com/featured/four-reasons-why-enterprises-struggle-to-deploy-devsecops/   
Published: 2022 05 23 16:38:53
Received: 2022 05 23 17:09:41
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Four Reasons Why Enterprises Struggle to Deploy DevSecOps - ITSecurityWire - published over 2 years ago.
Content: DevSecOps, automation, DevOps, Infrastructure-as-Code (IaC), Kubernetes, Continuous Integration/Continuous Delivery (CI/CD), Linux Foundation, ...
https://itsecuritywire.com/featured/four-reasons-why-enterprises-struggle-to-deploy-devsecops/   
Published: 2022 05 23 16:38:53
Received: 2022 05 23 17:09:41
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Cybersecurity Veterans Join BlueVoyant's Strategic Development Group - PR Newswire - published over 2 years ago.
Content: PRNewswire/ -- BlueVoyant, an industry-leading internal and external cyber defense platform, today announced that veteran cybersecurity ...
https://www.prnewswire.com/news-releases/cybersecurity-veterans-join-bluevoyants-strategic-development-group-301552517.html   
Published: 2022 05 23 13:00:53
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Cybersecurity Veterans Join BlueVoyant's Strategic Development Group - PR Newswire - published over 2 years ago.
Content: PRNewswire/ -- BlueVoyant, an industry-leading internal and external cyber defense platform, today announced that veteran cybersecurity ...
https://www.prnewswire.com/news-releases/cybersecurity-veterans-join-bluevoyants-strategic-development-group-301552517.html   
Published: 2022 05 23 13:00:53
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Reskilling workers can help meet the cybersecurity staffing challenge | Security Magazine - published over 2 years ago.
Content: Reskilling should be one of the primary strategies companies use to build their cybersecurity workforce.
https://www.securitymagazine.com/articles/97669-reskilling-workers-can-help-meet-the-cybersecurity-staffing-challenge   
Published: 2022 05 23 14:36:21
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Reskilling workers can help meet the cybersecurity staffing challenge | Security Magazine - published over 2 years ago.
Content: Reskilling should be one of the primary strategies companies use to build their cybersecurity workforce.
https://www.securitymagazine.com/articles/97669-reskilling-workers-can-help-meet-the-cybersecurity-staffing-challenge   
Published: 2022 05 23 14:36:21
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: 100K in the UK - Professional Security Magazine - published over 2 years ago.
Content: On the scheme, Simon Hepburn, CEO of the membership body the UK Cyber Security Council, says: “Cybersecurity certifications that validate young ...
https://www.professionalsecurity.co.uk/news/training/100k-in-the-uk/   
Published: 2022 05 23 15:32:15
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: 100K in the UK - Professional Security Magazine - published over 2 years ago.
Content: On the scheme, Simon Hepburn, CEO of the membership body the UK Cyber Security Council, says: “Cybersecurity certifications that validate young ...
https://www.professionalsecurity.co.uk/news/training/100k-in-the-uk/   
Published: 2022 05 23 15:32:15
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: VERTs Cybersecurity News for the Week of May 16, 2022 - Tripwire - published over 2 years ago.
Content: Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added ...
https://www.tripwire.com/state-of-security/featured/vert-cybersecurity-news-may-16-2022/   
Published: 2022 05 23 16:17:53
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: VERTs Cybersecurity News for the Week of May 16, 2022 - Tripwire - published over 2 years ago.
Content: Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added ...
https://www.tripwire.com/state-of-security/featured/vert-cybersecurity-news-may-16-2022/   
Published: 2022 05 23 16:17:53
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Successful Cybersecurity Integrates Agile and Well-Trained Users - published over 2 years ago.
Content: Netskope CISO and Head of Cyber Intelligence Strategy Nate Smolenski, DISA CTO Stephen Wallace, and GAO IT &amp; Cybersecurity Director Kevin Walsh.
https://governmentciomedia.com/successful-cybersecurity-integrates-agile-and-well-trained-users   
Published: 2022 05 23 16:30:01
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Successful Cybersecurity Integrates Agile and Well-Trained Users - published over 2 years ago.
Content: Netskope CISO and Head of Cyber Intelligence Strategy Nate Smolenski, DISA CTO Stephen Wallace, and GAO IT &amp; Cybersecurity Director Kevin Walsh.
https://governmentciomedia.com/successful-cybersecurity-integrates-agile-and-well-trained-users   
Published: 2022 05 23 16:30:01
Received: 2022 05 23 17:01:40
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Industry Highlights NIST Cybersecurity Framework's Value as NIST Weighs a Potential Update - published over 2 years ago.
Content: Public comments in an ongoing cybersecurity proceeding at the National Institute of Standards and Technology (NIST) highlight the utility of a ...
https://www.jdsupra.com/legalnews/industry-highlights-nist-cybersecurity-4475680/   
Published: 2022 05 23 16:54:15
Received: 2022 05 23 17:01:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Industry Highlights NIST Cybersecurity Framework's Value as NIST Weighs a Potential Update - published over 2 years ago.
Content: Public comments in an ongoing cybersecurity proceeding at the National Institute of Standards and Technology (NIST) highlight the utility of a ...
https://www.jdsupra.com/legalnews/industry-highlights-nist-cybersecurity-4475680/   
Published: 2022 05 23 16:54:15
Received: 2022 05 23 17:01:39
Feed: Google Alert – cybersecurity
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: Beneath the surface: Uncovering the shift in web skimming - published over 2 years ago.
Content: submitted by /u/SCI_Rusher [link] [comments]
https://www.reddit.com/r/netsec/comments/uw42x0/beneath_the_surface_uncovering_the_shift_in_web/   
Published: 2022 05 23 16:24:25
Received: 2022 05 23 16:47:00
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Beneath the surface: Uncovering the shift in web skimming - published over 2 years ago.
Content: submitted by /u/SCI_Rusher [link] [comments]
https://www.reddit.com/r/netsec/comments/uw42x0/beneath_the_surface_uncovering_the_shift_in_web/   
Published: 2022 05 23 16:24:25
Received: 2022 05 23 16:47:00
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Hiding MSFVENOM Payloads in USB NIC EEPROM - published over 2 years ago.
Content: submitted by /u/lightgrains [link] [comments]
https://www.reddit.com/r/netsec/comments/uw4feh/hiding_msfvenom_payloads_in_usb_nic_eeprom/   
Published: 2022 05 23 16:40:10
Received: 2022 05 23 16:47:00
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Hiding MSFVENOM Payloads in USB NIC EEPROM - published over 2 years ago.
Content: submitted by /u/lightgrains [link] [comments]
https://www.reddit.com/r/netsec/comments/uw4feh/hiding_msfvenom_payloads_in_usb_nic_eeprom/   
Published: 2022 05 23 16:40:10
Received: 2022 05 23 16:47:00
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: New RansomHouse group sets up extortion market, adds first victims - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/new-ransomhouse-group-sets-up-extortion-market-adds-first-victims/   
Published: 2022 05 23 16:26:19
Received: 2022 05 23 16:42:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Article: New RansomHouse group sets up extortion market, adds first victims - published over 2 years ago.
Content:
https://www.bleepingcomputer.com/news/security/new-ransomhouse-group-sets-up-extortion-market-adds-first-victims/   
Published: 2022 05 23 16:26:19
Received: 2022 05 23 16:42:11
Feed: Bleeping Computer - All News Feeds
Source: Bleeping Computer
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: $4.8 million awarded to Ohio schools for safety improvements - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97673-48-million-awarded-to-ohio-schools-for-safety-improvements   
Published: 2022 05 23 15:23:43
Received: 2022 05 23 16:42:08
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: $4.8 million awarded to Ohio schools for safety improvements - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97673-48-million-awarded-to-ohio-schools-for-safety-improvements   
Published: 2022 05 23 15:23:43
Received: 2022 05 23 16:42:08
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: CrowdStrike to showcase new ITD at ITWeb Security Summit 2022 - published over 2 years ago.
Content: Global cyber security leader CrowdStrike will return to the ITWeb Security Summit this year, showcasing its new Falcon Identity Threat Detection ...
https://www.itweb.co.za/content/lwrKx73YGOBqmg1o   
Published: 2022 05 23 15:19:22
Received: 2022 05 23 16:41:38
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: CrowdStrike to showcase new ITD at ITWeb Security Summit 2022 - published over 2 years ago.
Content: Global cyber security leader CrowdStrike will return to the ITWeb Security Summit this year, showcasing its new Falcon Identity Threat Detection ...
https://www.itweb.co.za/content/lwrKx73YGOBqmg1o   
Published: 2022 05 23 15:19:22
Received: 2022 05 23 16:41:38
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Bahrain Business: SICO partners with Beyon for cyber security services - Gulf Daily News - published over 2 years ago.
Content: Launched in January, Beyon Cyber is a subsidiary of Batelco and is focussed on offering advanced end-to-end cyber-security solutions, with managed ...
https://www.gdnonline.com/Details/1092958/SICO-partners-with-Beyon-for-cyber-security-services   
Published: 2022 05 23 15:46:41
Received: 2022 05 23 16:41:37
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Article: Bahrain Business: SICO partners with Beyon for cyber security services - Gulf Daily News - published over 2 years ago.
Content: Launched in January, Beyon Cyber is a subsidiary of Batelco and is focussed on offering advanced end-to-end cyber-security solutions, with managed ...
https://www.gdnonline.com/Details/1092958/SICO-partners-with-Beyon-for-cyber-security-services   
Published: 2022 05 23 15:46:41
Received: 2022 05 23 16:41:37
Feed: Google Alert – "cyber security"
Source: Google Alert
Category: News
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: DevSecOps Engineer job with Lawrence Harvey | 2095688 - Times Appointments - published over 2 years ago.
Content: DevSecOps Engineer Salary - £80,000 + Bonus + Benefits Location - Remote A FinTech scale up are in search of a DevSecOps / Cloud Security Engineer ...
https://appointments.thetimes.co.uk/job/2095688/devsecops-engineer/   
Published: 2022 05 23 12:21:19
Received: 2022 05 23 16:29:17
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer job with Lawrence Harvey | 2095688 - Times Appointments - published over 2 years ago.
Content: DevSecOps Engineer Salary - £80,000 + Bonus + Benefits Location - Remote A FinTech scale up are in search of a DevSecOps / Cloud Security Engineer ...
https://appointments.thetimes.co.uk/job/2095688/devsecops-engineer/   
Published: 2022 05 23 12:21:19
Received: 2022 05 23 16:29:17
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer at Lokalise - Startupers - published over 2 years ago.
Content: Businesses like Hyundai use our localisation platform to bring developers, designers and translators together in one virtual workspace. They use our ...
https://www.startupers.com/jobs/lokalise-5130209003   
Published: 2022 05 23 12:49:03
Received: 2022 05 23 16:29:17
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps Engineer at Lokalise - Startupers - published over 2 years ago.
Content: Businesses like Hyundai use our localisation platform to bring developers, designers and translators together in one virtual workspace. They use our ...
https://www.startupers.com/jobs/lokalise-5130209003   
Published: 2022 05 23 12:49:03
Received: 2022 05 23 16:29:17
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: DevSecOps | FINN.no - published over 2 years ago.
Content: Bli med å skape et smartere samfunn! I Norkart er du med på å digitalisere Norge – ikke i teorien – men i virkeligheten.
https://www.finn.no/job/fulltime/ad.html?finnkode=259525083   
Published: 2022 05 23 15:05:47
Received: 2022 05 23 16:29:16
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: DevSecOps | FINN.no - published over 2 years ago.
Content: Bli med å skape et smartere samfunn! I Norkart er du med på å digitalisere Norge – ikke i teorien – men i virkeligheten.
https://www.finn.no/job/fulltime/ad.html?finnkode=259525083   
Published: 2022 05 23 15:05:47
Received: 2022 05 23 16:29:16
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: CVE-2022-28998 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28998   
Published: 2022 05 23 14:16:26
Received: 2022 05 23 16:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28998 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28998   
Published: 2022 05 23 14:16:26
Received: 2022 05 23 16:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28997 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28997   
Published: 2022 05 23 14:16:26
Received: 2022 05 23 16:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-28997 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28997   
Published: 2022 05 23 14:16:26
Received: 2022 05 23 16:23:02
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: CVE-2022-0900 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0900   
Published: 2022 05 23 14:16:26
Received: 2022 05 23 16:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Article: CVE-2022-0900 - published over 2 years ago.
Content:
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0900   
Published: 2022 05 23 14:16:26
Received: 2022 05 23 16:22:55
Feed: National Vulnerability Database
Source: National Vulnerability Database
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: CISA Adds 21 Known Exploited Vulnerabilities to Catalog - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/05/23/cisa-adds-21-known-exploited-vulnerabilities-catalog   
Published: 2022 05 23 15:00:00
Received: 2022 05 23 16:22:13
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: CISA Adds 21 Known Exploited Vulnerabilities to Catalog - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/05/23/cisa-adds-21-known-exploited-vulnerabilities-catalog   
Published: 2022 05 23 15:00:00
Received: 2022 05 23 16:22:13
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: Mozilla Releases Security Products for Multiple Firefox Products - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/05/23/mozilla-releases-security-products-multiple-firefox-products   
Published: 2022 05 23 15:30:00
Received: 2022 05 23 16:22:13
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Article: Mozilla Releases Security Products for Multiple Firefox Products - published over 2 years ago.
Content:
https://us-cert.cisa.gov/ncas/current-activity/2022/05/23/mozilla-releases-security-products-multiple-firefox-products   
Published: 2022 05 23 15:30:00
Received: 2022 05 23 16:22:13
Feed: CISA All NCAS Products
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: All
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Christofer Hoff joins LastPass as Chief Secure Technology Officer - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97672-christofer-hoff-joins-lastpass-as-chief-secure-technology-officer   
Published: 2022 05 23 14:45:00
Received: 2022 05 23 16:22:07
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Christofer Hoff joins LastPass as Chief Secure Technology Officer - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97672-christofer-hoff-joins-lastpass-as-chief-secure-technology-officer   
Published: 2022 05 23 14:45:00
Received: 2022 05 23 16:22:07
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Artificial intelligence investment grows, but barriers remain - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97674-artificial-intelligence-investment-grows-but-barriers-remain   
Published: 2022 05 23 16:00:00
Received: 2022 05 23 16:22:07
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Artificial intelligence investment grows, but barriers remain - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97674-artificial-intelligence-investment-grows-but-barriers-remain   
Published: 2022 05 23 16:00:00
Received: 2022 05 23 16:22:07
Feed: Security Magazine – All Feeds
Source: Security Magazine
Category: News
Topic: Security
Article: Christofer Hoff joins LastPass as Chief Secure Technology Officer - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97672-christofer-hoff-joins-lastpass-as-chief-secure-technology-officer   
Published: 2022 05 23 14:45:00
Received: 2022 05 23 16:21:45
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Christofer Hoff joins LastPass as Chief Secure Technology Officer - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97672-christofer-hoff-joins-lastpass-as-chief-secure-technology-officer   
Published: 2022 05 23 14:45:00
Received: 2022 05 23 16:21:45
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Artificial intelligence investment grows, but barriers remain - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97674-artificial-intelligence-investment-grows-but-barriers-remain   
Published: 2022 05 23 16:00:00
Received: 2022 05 23 16:21:45
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Article: Artificial intelligence investment grows, but barriers remain - published over 2 years ago.
Content:
https://www.securitymagazine.com/articles/97674-artificial-intelligence-investment-grows-but-barriers-remain   
Published: 2022 05 23 16:00:00
Received: 2022 05 23 16:21:45
Feed: Security Magazine – News
Source: Security Magazine
Category: News
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: 6 formas en que los equipos de DevSecOps deben responder | Ciberseguridad Inteligente - published over 2 years ago.
Content: Las herramientas de seguridad tradicionales de DevSecOps están desactualizadas y son menos precisas en comparación con las tecnologías más nuevas, ...
https://discoverthenew.ituser.es/ciberseguridad-inteligente/2022/05/6-formas-en-que-los-equipos-de-devsecops-deben-responder   
Published: 2022 05 23 11:11:35
Received: 2022 05 23 16:09:37
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: 6 formas en que los equipos de DevSecOps deben responder | Ciberseguridad Inteligente - published over 2 years ago.
Content: Las herramientas de seguridad tradicionales de DevSecOps están desactualizadas y son menos precisas en comparación con las tecnologías más nuevas, ...
https://discoverthenew.ituser.es/ciberseguridad-inteligente/2022/05/6-formas-en-que-los-equipos-de-devsecops-deben-responder   
Published: 2022 05 23 11:11:35
Received: 2022 05 23 16:09:37
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Yes, Containers Are Terrific, But Watch the Security Risks - The Hacker News - published over 2 years ago.
Content: This is why we're increasingly hearing about DevSecOps as it evolves from DevOps because developers have noticed that the DevOps model alone does ...
https://thehackernews.com/2022/05/yes-containers-are-terrific-but-watch.html   
Published: 2022 05 23 15:16:30
Received: 2022 05 23 16:09:36
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Yes, Containers Are Terrific, But Watch the Security Risks - The Hacker News - published over 2 years ago.
Content: This is why we're increasingly hearing about DevSecOps as it evolves from DevOps because developers have noticed that the DevOps model alone does ...
https://thehackernews.com/2022/05/yes-containers-are-terrific-but-watch.html   
Published: 2022 05 23 15:16:30
Received: 2022 05 23 16:09:36
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Oui, Les Conteneurs Sont Formidables, Mais Surveillez Les Risques De Sécurité - published over 2 years ago.
Content: C'est pourquoi nous entendons de plus en plus parler de DevSecOps à mesure qu'il évolue à partir de DevOps, car les développeurs ont remarqué que ...
https://fr.techtribune.net/securite/oui-les-conteneurs-sont-formidables-mais-surveillez-les-risques-de-securite/322421/   
Published: 2022 05 23 15:42:28
Received: 2022 05 23 16:09:36
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Article: Oui, Les Conteneurs Sont Formidables, Mais Surveillez Les Risques De Sécurité - published over 2 years ago.
Content: C'est pourquoi nous entendons de plus en plus parler de DevSecOps à mesure qu'il évolue à partir de DevOps, car les développeurs ont remarqué que ...
https://fr.techtribune.net/securite/oui-les-conteneurs-sont-formidables-mais-surveillez-les-risques-de-securite/322421/   
Published: 2022 05 23 15:42:28
Received: 2022 05 23 16:09:36
Feed: Google Alert - devsecops
Source: Google Alert
Category: News
Topic: DevSecOps
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: mx-takeover focuses DNS MX records and detects misconfigured MX records. - published over 2 years ago.
Content: submitted by /u/0xmusana [link] [comments]
https://www.reddit.com/r/netsec/comments/uw2s73/mxtakeover_focuses_dns_mx_records_and_detects/   
Published: 2022 05 23 15:26:55
Received: 2022 05 23 16:06:51
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: mx-takeover focuses DNS MX records and detects misconfigured MX records. - published over 2 years ago.
Content: submitted by /u/0xmusana [link] [comments]
https://www.reddit.com/r/netsec/comments/uw2s73/mxtakeover_focuses_dns_mx_records_and_detects/   
Published: 2022 05 23 15:26:55
Received: 2022 05 23 16:06:51
Feed: /r/netsec - Information Security News and Discussion
Source: /r/netsec - Information Security News and Discussion
Category: Cyber Security
Topic: Cyber Security
Article: Android.MisoSMS : Its Back! Now With XTEA - published over 10 years ago.
Content:   FireEye Labs recently found a more advanced variant of Android.MisoSMS, the SMS-stealing malware that we uncovered last December — yet another sign of cybercriminals’ growing interest in hijacking mobile devices for surveillance and data theft. Like the original version of the malware, the new variant sends copies of users’ text messages to ser...
https://www.fireeye.com/blog/threat-research/2014/03/android-misosms-its-back-now-with-xtea.html   
Published: 2014 03 31 08:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Android.MisoSMS : Its Back! Now With XTEA - published over 10 years ago.
Content:   FireEye Labs recently found a more advanced variant of Android.MisoSMS, the SMS-stealing malware that we uncovered last December — yet another sign of cybercriminals’ growing interest in hijacking mobile devices for surveillance and data theft. Like the original version of the malware, the new variant sends copies of users’ text messages to ser...
https://www.fireeye.com/blog/threat-research/2014/03/android-misosms-its-back-now-with-xtea.html   
Published: 2014 03 31 08:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370 - published over 10 years ago.
Content: While many advanced persistent threat (APT) groups have increasingly embraced strategic Web compromise as a malware delivery vector, groups also continue to rely on spear-phishing emails that leverage popular news stories. The recent tragic disappearance of flight MH 370 is no exception. This post will examine multiple instances from different thre...
https://www.fireeye.com/blog/threat-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html   
Published: 2014 03 25 04:01:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Spear Phishing the News Cycle: APT Actors Leverage Interest in the Disappearance of Malaysian Flight MH 370 - published over 10 years ago.
Content: While many advanced persistent threat (APT) groups have increasingly embraced strategic Web compromise as a malware delivery vector, groups also continue to rely on spear-phishing emails that leverage popular news stories. The recent tragic disappearance of flight MH 370 is no exception. This post will examine multiple instances from different thre...
https://www.fireeye.com/blog/threat-research/2014/03/spear-phishing-the-news-cycle-apt-actors-leverage-interest-in-the-disappearance-of-malaysian-flight-mh-370.html   
Published: 2014 03 25 04:01:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms in RATs - published over 10 years ago.
Content: FireEye recently observed a targeted attack on a U.S.-based financial institution via a spear-phishing email. The payload used in this campaign is a tool called WinSpy, which is sold by the author as a spying and monitoring tool. The features in this tool resemble that of many other off-the-shelf RATs (Remote Administration Tools) available today. ...
https://www.fireeye.com/blog/threat-research/2014/03/from-windows-to-droids-an-insight-in-to-multi-vector-attack-mechanisms-in-rats.html   
Published: 2014 03 18 08:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: From Windows to Droids: An Insight in to Multi-vector Attack Mechanisms in RATs - published over 10 years ago.
Content: FireEye recently observed a targeted attack on a U.S.-based financial institution via a spear-phishing email. The payload used in this campaign is a tool called WinSpy, which is sold by the author as a spying and monitoring tool. The features in this tool resemble that of many other off-the-shelf RATs (Remote Administration Tools) available today. ...
https://www.fireeye.com/blog/threat-research/2014/03/from-windows-to-droids-an-insight-in-to-multi-vector-attack-mechanisms-in-rats.html   
Published: 2014 03 18 08:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: A Little Bird Told Me: Personal Information Sharing in Angry Birds and its Ad Libraries - published over 10 years ago.
Content: Many popular mobile apps, including Rovio’s ubiquitous Angry Birds, collect and share players’ personal information much more widely than most people realize. Some news reports have begun to scratch the surface of the situation. The New York Times reported on Angry Birds and other data-hungry apps last October. And in January, the newspaper ...
https://www.fireeye.com/blog/threat-research/2014/03/a-little-bird-told-me-personal-information-sharing-in-angry-birds-and-its-ad-libraries.html   
Published: 2014 03 27 15:30:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: A Little Bird Told Me: Personal Information Sharing in Angry Birds and its Ad Libraries - published over 10 years ago.
Content: Many popular mobile apps, including Rovio’s ubiquitous Angry Birds, collect and share players’ personal information much more widely than most people realize. Some news reports have begun to scratch the surface of the situation. The New York Times reported on Angry Birds and other data-hungry apps last October. And in January, the newspaper ...
https://www.fireeye.com/blog/threat-research/2014/03/a-little-bird-told-me-personal-information-sharing-in-angry-birds-and-its-ad-libraries.html   
Published: 2014 03 27 15:30:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Write Once, Exploit Everywhere: FireEye Report Analyzes Four Widely Exploited Java Vulnerabilities - published over 10 years ago.
Content: Over the last couple of decades, Java has become the lingua franca of software development, a near-universal platform that works across different operating systems and devices. With its “write once, run anywhere” mantra, Java has drawn a horde of developers looking to serve a large user base as efficiently as possible. Cyber attackers like Java for m...
https://www.fireeye.com/blog/threat-research/2014/02/write-once-exploit-everywhere-fireeye-report-analyzes-four-widely-exploited-java-vulnerabilities.html   
Published: 2014 02 21 15:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Write Once, Exploit Everywhere: FireEye Report Analyzes Four Widely Exploited Java Vulnerabilities - published over 10 years ago.
Content: Over the last couple of decades, Java has become the lingua franca of software development, a near-universal platform that works across different operating systems and devices. With its “write once, run anywhere” mantra, Java has drawn a horde of developers looking to serve a large user base as efficiently as possible. Cyber attackers like Java for m...
https://www.fireeye.com/blog/threat-research/2014/02/write-once-exploit-everywhere-fireeye-report-analyzes-four-widely-exploited-java-vulnerabilities.html   
Published: 2014 02 21 15:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website - published almost 11 years ago.
Content: On February 11, FireEye identified a zero-day exploit (CVE-2014-0322)  being served up from the U.S. Veterans of Foreign Wars’ website (vfw[.]org). We believe the attack is a strategic Web compromise targeting American military personnel amid a paralyzing snowstorm at the U.S. Capitol in the days leading up to the Presidents Day holiday weekend. Ba...
https://www.fireeye.com/blog/threat-research/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html   
Published: 2014 02 13 23:06:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website - published almost 11 years ago.
Content: On February 11, FireEye identified a zero-day exploit (CVE-2014-0322)  being served up from the U.S. Veterans of Foreign Wars’ website (vfw[.]org). We believe the attack is a strategic Web compromise targeting American military personnel amid a paralyzing snowstorm at the U.S. Capitol in the days leading up to the Presidents Day holiday weekend. Ba...
https://www.fireeye.com/blog/threat-research/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html   
Published: 2014 02 13 23:06:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Background Monitoring on Non-Jailbroken iOS 7 Devices -- and a Mitigation - published over 10 years ago.
Content: Background monitoring mobile applications has become a hot topic on mobile devices. Existing reports show that such monitoring can be conducted on jailbroken iOS devices. FireEye mobile security researchers have discovered such vulnerability, and found approaches to bypass Apple's app review process effectively and exploit non-jailbroken iOS 7 succ...
https://www.fireeye.com/blog/threat-research/2014/02/background-monitoring-on-non-jailbroken-ios-7-devices-and-a-mitigation.html   
Published: 2014 02 25 01:24:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Background Monitoring on Non-Jailbroken iOS 7 Devices -- and a Mitigation - published over 10 years ago.
Content: Background monitoring mobile applications has become a hot topic on mobile devices. Existing reports show that such monitoring can be conducted on jailbroken iOS devices. FireEye mobile security researchers have discovered such vulnerability, and found approaches to bypass Apple's app review process effectively and exploit non-jailbroken iOS 7 succ...
https://www.fireeye.com/blog/threat-research/2014/02/background-monitoring-on-non-jailbroken-ios-7-devices-and-a-mitigation.html   
Published: 2014 02 25 01:24:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: Amazon's Mobile Shopping Clients and CAPTCHA - published over 10 years ago.
Content: Amazon is a popular online retailer serving millions of users. Unfortunately, FireEye mobile security researchers have found security issues within Amazon’s mobile apps on both Android and iOS platforms through which attackers can crack the passwords of target Amazon accounts. Amazon confirmed our findings and hot fixed the issue. Recently, we found ...
https://www.fireeye.com/blog/threat-research/2014/02/amazons-mobile-shopping-clients-and-captcha.html   
Published: 2014 02 26 20:39:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Amazon's Mobile Shopping Clients and CAPTCHA - published over 10 years ago.
Content: Amazon is a popular online retailer serving millions of users. Unfortunately, FireEye mobile security researchers have found security issues within Amazon’s mobile apps on both Android and iOS platforms through which attackers can crack the passwords of target Amazon accounts. Amazon confirmed our findings and hot fixed the issue. Recently, we found ...
https://www.fireeye.com/blog/threat-research/2014/02/amazons-mobile-shopping-clients-and-captcha.html   
Published: 2014 02 26 20:39:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Trends in Targeted Attacks: 2013 - published almost 11 years ago.
Content: FireEye has been busy over the last year. We have tracked malware-based espionage campaigns and published research papers on numerous advanced threat actors. We chopped through Poison Ivy, documented a cyber arms dealer, and revealed that Operation Ke3chang had targeted Ministries of Foreign Affairs in Europe. Worldwide, security experts made ma...
https://www.fireeye.com/blog/threat-research/2014/01/trends-in-targeted-attacks-2013.html   
Published: 2014 01 13 10:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Trends in Targeted Attacks: 2013 - published almost 11 years ago.
Content: FireEye has been busy over the last year. We have tracked malware-based espionage campaigns and published research papers on numerous advanced threat actors. We chopped through Poison Ivy, documented a cyber arms dealer, and revealed that Operation Ke3chang had targeted Ministries of Foreign Affairs in Europe. Worldwide, security experts made ma...
https://www.fireeye.com/blog/threat-research/2014/01/trends-in-targeted-attacks-2013.html   
Published: 2014 01 13 10:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: JS-Binding-Over-HTTP Vulnerability and JavaScript Sidedoor: Security Risks Affecting Billions of Android App Downloads - published almost 11 years ago.
Content: Third-party libraries, especially ad libraries, are widely used in Android apps. Unfortunately, many of them have security and privacy issues. In this blog, we summarize our findings related to the insecure usage of JavaScript binding in ad libraries. First, we describe a widespread security issue with using JavaScript binding (addJavascriptInterface...
https://www.fireeye.com/blog/threat-research/2014/01/js-binding-over-http-vulnerability-and-javascript-sidedoor.html   
Published: 2014 01 17 00:45:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: JS-Binding-Over-HTTP Vulnerability and JavaScript Sidedoor: Security Risks Affecting Billions of Android App Downloads - published almost 11 years ago.
Content: Third-party libraries, especially ad libraries, are widely used in Android apps. Unfortunately, many of them have security and privacy issues. In this blog, we summarize our findings related to the insecure usage of JavaScript binding in ad libraries. First, we describe a widespread security issue with using JavaScript binding (addJavascriptInterface...
https://www.fireeye.com/blog/threat-research/2014/01/js-binding-over-http-vulnerability-and-javascript-sidedoor.html   
Published: 2014 01 17 00:45:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Android.HeHe: Malware Now Disconnects Phone Calls - published almost 11 years ago.
Content: FireEye Labs has recently discovered six variants of a new Android threat that steals text messages and intercepts phone calls. We named this sample set “Android.HeHe” after the name of the activity that is used consistently across all samples. Here is a list of known bot variants: MD5 VirusTotal Detection Ratio 1caa...
https://www.fireeye.com/blog/threat-research/2014/01/android-hehe-malware-now-disconnects-phone-calls.html   
Published: 2014 01 21 10:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Android.HeHe: Malware Now Disconnects Phone Calls - published almost 11 years ago.
Content: FireEye Labs has recently discovered six variants of a new Android threat that steals text messages and intercepts phone calls. We named this sample set “Android.HeHe” after the name of the activity that is used consistently across all samples. Here is a list of known bot variants: MD5 VirusTotal Detection Ratio 1caa...
https://www.fireeye.com/blog/threat-research/2014/01/android-hehe-malware-now-disconnects-phone-calls.html   
Published: 2014 01 21 10:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware in Recent Campaign - published almost 7 years ago.
Content: Introduction FireEye researchers recently observed threat actors leveraging relatively new vulnerabilities in Microsoft Office to spread Zyklon HTTP malware. Zyklon has been observed in the wild since early 2016 and provides myriad sophisticated capabilities. Zyklon is a publicly available, full-featured backdoor capable of keylogging, password har...
https://www.fireeye.com/blog/threat-research/2018/01/microsoft-office-vulnerabilities-used-to-distribute-zyklon-malware.html   
Published: 2018 01 17 17:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware in Recent Campaign - published almost 7 years ago.
Content: Introduction FireEye researchers recently observed threat actors leveraging relatively new vulnerabilities in Microsoft Office to spread Zyklon HTTP malware. Zyklon has been observed in the wild since early 2016 and provides myriad sophisticated capabilities. Zyklon is a publicly available, full-featured backdoor capable of keylogging, password har...
https://www.fireeye.com/blog/threat-research/2018/01/microsoft-office-vulnerabilities-used-to-distribute-zyklon-malware.html   
Published: 2018 01 17 17:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations - published almost 7 years ago.
Content: On Jan. 31, KISA (KrCERT) published an advisory about an Adobe Flash zero-day vulnerability (CVE-2018-4878) being exploited in the wild. On Feb. 1, Adobe issued an advisory confirming the vulnerability exists in Adobe Flash Player 28.0.0.137 and earlier versions, and that successful exploitation could potentially allow an attacker to take con...
https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html   
Published: 2018 02 03 02:15:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations - published almost 7 years ago.
Content: On Jan. 31, KISA (KrCERT) published an advisory about an Adobe Flash zero-day vulnerability (CVE-2018-4878) being exploited in the wild. On Feb. 1, Adobe issued an advisory confirming the vulnerability exists in Adobe Flash Player 28.0.0.137 and earlier versions, and that successful exploitation could potentially allow an attacker to take con...
https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html   
Published: 2018 02 03 02:15:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques Used Post-Exploitation and Pre-Mining - published almost 7 years ago.
Content: Introduction FireEye researchers recently observed threat actors abusing CVE-2017-10271 to deliver various cryptocurrency miners. CVE-2017-10271 is a known input validation vulnerability that exists in the WebLogic Server Security Service (WLS Security) in Oracle WebLogic Server versions 12.2.1.2.0 and prior, and attackers can exploit it to remotel...
https://www.fireeye.com/blog/threat-research/2018/02/cve-2017-10271-used-to-deliver-cryptominers.html   
Published: 2018 02 15 16:30:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: CVE-2017-10271 Used to Deliver CryptoMiners: An Overview of Techniques Used Post-Exploitation and Pre-Mining - published almost 7 years ago.
Content: Introduction FireEye researchers recently observed threat actors abusing CVE-2017-10271 to deliver various cryptocurrency miners. CVE-2017-10271 is a known input validation vulnerability that exists in the WebLogic Server Security Service (WLS Security) in Oracle WebLogic Server versions 12.2.1.2.0 and prior, and attackers can exploit it to remotel...
https://www.fireeye.com/blog/threat-research/2018/02/cve-2017-10271-used-to-deliver-cryptominers.html   
Published: 2018 02 15 16:30:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: SANNY Malware Delivery Method Updated in Recently Observed Attacks - published over 6 years ago.
Content: Introduction In the third week of March 2018, through FireEye’s Dynamic Threat Intelligence, FireEye discovered malicious macro-based Microsoft Word documents distributing SANNY malware to multiple governments worldwide. Each malicious document lure was crafted in regard to relevant regional geopolitical issues. FireEye has tracked the SANNY malwa...
https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html   
Published: 2018 03 23 15:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: SANNY Malware Delivery Method Updated in Recently Observed Attacks - published over 6 years ago.
Content: Introduction In the third week of March 2018, through FireEye’s Dynamic Threat Intelligence, FireEye discovered malicious macro-based Microsoft Word documents distributing SANNY malware to multiple governments worldwide. Each malicious document lure was crafted in regard to relevant regional geopolitical issues. FireEye has tracked the SANNY malwa...
https://www.fireeye.com/blog/threat-research/2018/03/sanny-malware-delivery-method-updated-in-recently-observed-attacks.html   
Published: 2018 03 23 15:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Fake Software Update Abuses NetSupport Remote Access Tool - published over 6 years ago.
Content: Over the last few months, FireEye has tracked an in-the-wild campaign that leverages compromised sites to spread fake updates. In some cases, the payload was the NetSupport Manager remote access tool (RAT). NetSupport Manager is a commercially available RAT that can be used legitimately by system administrators for remotely accessing client compute...
https://www.fireeye.com/blog/threat-research/2018/04/fake-software-update-abuses-netsupport-remote-access-tool.html   
Published: 2018 04 05 15:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Fake Software Update Abuses NetSupport Remote Access Tool - published over 6 years ago.
Content: Over the last few months, FireEye has tracked an in-the-wild campaign that leverages compromised sites to spread fake updates. In some cases, the payload was the NetSupport Manager remote access tool (RAT). NetSupport Manager is a commercially available RAT that can be used legitimately by system administrators for remotely accessing client compute...
https://www.fireeye.com/blog/threat-research/2018/04/fake-software-update-abuses-netsupport-remote-access-tool.html   
Published: 2018 04 05 15:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Metamorfo Campaigns Targeting Brazilian Users - published over 6 years ago.
Content: FireEye Labs recently identified several widespread malspam (malware spam) campaigns targeting Brazilian companies with the goal of delivering banking Trojans. We are referring to these campaigns as Metamorfo. Across the stages of these campaigns, we have observed the use of several tactics and techniques to evade detection and deliver the maliciou...
https://www.fireeye.com/blog/threat-research/2018/04/metamorfo-campaign-targeting-brazilian-users.html   
Published: 2018 04 24 15:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Metamorfo Campaigns Targeting Brazilian Users - published over 6 years ago.
Content: FireEye Labs recently identified several widespread malspam (malware spam) campaigns targeting Brazilian companies with the goal of delivering banking Trojans. We are referring to these campaigns as Metamorfo. Across the stages of these campaigns, we have observed the use of several tactics and techniques to evade detection and deliver the maliciou...
https://www.fireeye.com/blog/threat-research/2018/04/metamorfo-campaign-targeting-brazilian-users.html   
Published: 2018 04 24 15:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Remote Authentication GeoFeasibility Tool - GeoLogonalyzer - published over 6 years ago.
Content: Users have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time. While the ability to access resources from anywhere is imperative for employees, threat actors often leverage stolen credentials to access systems and data. Due to large volumes of ...
https://www.fireeye.com/blog/threat-research/2018/05/remote-authentication-geofeasibility-tool-geologonalyzer.html   
Published: 2018 05 29 17:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Remote Authentication GeoFeasibility Tool - GeoLogonalyzer - published over 6 years ago.
Content: Users have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time. While the ability to access resources from anywhere is imperative for employees, threat actors often leverage stolen credentials to access systems and data. Due to large volumes of ...
https://www.fireeye.com/blog/threat-research/2018/05/remote-authentication-geofeasibility-tool-geologonalyzer.html   
Published: 2018 05 29 17:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: RIG Exploit Kit Delivering Monero Miner Via PROPagate Injection Technique - published over 6 years ago.
Content: Introduction Through FireEye Dynamic Threat Intelligence (DTI), we observed RIG Exploit Kit (EK) delivering a dropper that leverages the PROPagate injection technique to inject code that downloads and executes a Monero miner (similar activity has been reported by Trend Micro). Apart from leveraging a relatively lesser known injection technique, ...
https://www.fireeye.com/blog/threat-research/2018/06/rig-ek-delivering-monero-miner-via-propagate-injection-technique.html   
Published: 2018 06 28 16:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: RIG Exploit Kit Delivering Monero Miner Via PROPagate Injection Technique - published over 6 years ago.
Content: Introduction Through FireEye Dynamic Threat Intelligence (DTI), we observed RIG Exploit Kit (EK) delivering a dropper that leverages the PROPagate injection technique to inject code that downloads and executes a Monero miner (similar activity has been reported by Trend Micro). Apart from leveraging a relatively lesser known injection technique, ...
https://www.fireeye.com/blog/threat-research/2018/06/rig-ek-delivering-monero-miner-via-propagate-injection-technique.html   
Published: 2018 06 28 16:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: Introducing Monitor.app for macOS - published over 7 years ago.
Content: UPDATE 2 (Oct. 24, 2018): Monitor.app now supports macOS 10.14. UPDATE (April 4, 2018): Monitor.app now supports macOS 10.13. As a malware analyst or systems programmer, having a suite of solid dynamic analysis tools is vital to being quick and effective. These tools enable us to understand malware capabilities and undocumented components of th...
https://www.fireeye.com/blog/threat-research/2017/03/introducing_monitor.html   
Published: 2017 03 31 14:15:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Introducing Monitor.app for macOS - published over 7 years ago.
Content: UPDATE 2 (Oct. 24, 2018): Monitor.app now supports macOS 10.14. UPDATE (April 4, 2018): Monitor.app now supports macOS 10.13. As a malware analyst or systems programmer, having a suite of solid dynamic analysis tools is vital to being quick and effective. These tools enable us to understand malware capabilities and undocumented components of th...
https://www.fireeye.com/blog/threat-research/2017/03/introducing_monitor.html   
Published: 2017 03 31 14:15:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: FLARE Script Series: Automating Objective-C Code Analysis with Emulation - published almost 6 years ago.
Content: This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing a new IDAPython library – flare-emu – powered by IDA Pro and the Unicorn emulation framework that provides scriptable emulation features for the x86, x86_64, ARM, and ARM64 architectures to reverse engineers. Along ...
https://www.fireeye.com/blog/threat-research/2018/12/automating-objective-c-code-analysis-with-emulation.html   
Published: 2018 12 12 17:30:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: FLARE Script Series: Automating Objective-C Code Analysis with Emulation - published almost 6 years ago.
Content: This blog post is the next episode in the FireEye Labs Advanced Reverse Engineering (FLARE) team Script Series. Today, we are sharing a new IDAPython library – flare-emu – powered by IDA Pro and the Unicorn emulation framework that provides scriptable emulation features for the x86, x86_64, ARM, and ARM64 architectures to reverse engineers. Along ...
https://www.fireeye.com/blog/threat-research/2018/12/automating-objective-c-code-analysis-with-emulation.html   
Published: 2018 12 12 17:30:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Breaking the Bank: Weakness in Financial AI Applications - published over 5 years ago.
Content: Currently, threat actors possess limited access to the technology required to conduct disruptive operations against financial artificial intelligence (AI) systems and the risk of this targeting type remains low. However, there is a high risk of threat actors leveraging AI as part of disinformation campaigns to cause financial panic. As AI financial...
https://www.fireeye.com/blog/threat-research/2019/03/breaking-the-bank-weakness-in-financial-ai-applications.html   
Published: 2019 03 13 16:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Breaking the Bank: Weakness in Financial AI Applications - published over 5 years ago.
Content: Currently, threat actors possess limited access to the technology required to conduct disruptive operations against financial artificial intelligence (AI) systems and the risk of this targeting type remains low. However, there is a high risk of threat actors leveraging AI as part of disinformation campaigns to cause financial panic. As AI financial...
https://www.fireeye.com/blog/threat-research/2019/03/breaking-the-bank-weakness-in-financial-ai-applications.html   
Published: 2019 03 13 16:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing - published over 5 years ago.
Content: Introduction Malware authors attempt to evade detection by executing their payload without having to write the executable file on the disk. One of the most commonly seen techniques of this "fileless" execution is code injection. Rather than executing the malware directly, attackers inject the malware code into the memory of another process that is...
https://www.fireeye.com/blog/threat-research/2019/03/dissecting-netwire-phishing-campaign-usage-of-process-hollowing.html   
Published: 2019 03 15 16:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Dissecting a NETWIRE Phishing Campaign's Usage of Process Hollowing - published over 5 years ago.
Content: Introduction Malware authors attempt to evade detection by executing their payload without having to write the executable file on the disk. One of the most commonly seen techniques of this "fileless" execution is code injection. Rather than executing the malware directly, attackers inject the malware code into the memory of another process that is...
https://www.fireeye.com/blog/threat-research/2019/03/dissecting-netwire-phishing-campaign-usage-of-process-hollowing.html   
Published: 2019 03 15 16:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: WinRAR Zero-day Abused in Multiple Campaigns - published over 5 years ago.
Content: WinRAR, an over 20-year-old file archival utility used by over 500 million users worldwide, recently acknowledged a long-standing vulnerability in its code-base. A recently published path traversal zero-day vulnerability, disclosed in CVE-2018-20250 by Check Point Research, enables attackers to specify arbitrary destinations during file extractio...
https://www.fireeye.com/blog/threat-research/2019/03/winrar-zero-day-abused-in-multiple-campaigns.html   
Published: 2019 03 26 15:30:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: WinRAR Zero-day Abused in Multiple Campaigns - published over 5 years ago.
Content: WinRAR, an over 20-year-old file archival utility used by over 500 million users worldwide, recently acknowledged a long-standing vulnerability in its code-base. A recently published path traversal zero-day vulnerability, disclosed in CVE-2018-20250 by Check Point Research, enables attackers to specify arbitrary destinations during file extractio...
https://www.fireeye.com/blog/threat-research/2019/03/winrar-zero-day-abused-in-multiple-campaigns.html   
Published: 2019 03 26 15:30:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Spear Phishing Campaign Targets Ukraine Government and Military; Infrastructure Reveals Potential Link to So-Called Luhansk People's Republic - published over 5 years ago.
Content: In early 2019, FireEye Threat Intelligence identified a spear phishing email targeting government entities in Ukraine. The spear phishing email included a malicious LNK file with PowerShell script to download the second-stage payload from the command and control (C&amp;C) server. The email was received by military departments in Ukraine and include...
https://www.fireeye.com/blog/threat-research/2019/04/spear-phishing-campaign-targets-ukraine-government.html   
Published: 2019 04 16 07:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Spear Phishing Campaign Targets Ukraine Government and Military; Infrastructure Reveals Potential Link to So-Called Luhansk People's Republic - published over 5 years ago.
Content: In early 2019, FireEye Threat Intelligence identified a spear phishing email targeting government entities in Ukraine. The spear phishing email included a malicious LNK file with PowerShell script to download the second-stage payload from the command and control (C&amp;C) server. The email was received by military departments in Ukraine and include...
https://www.fireeye.com/blog/threat-research/2019/04/spear-phishing-campaign-targets-ukraine-government.html   
Published: 2019 04 16 07:00:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: FLARE Script Series: Automating Obfuscated String Decoding - published almost 9 years ago.
Content: Introduction We are expanding our script series beyond IDA Pro. This post extends the FireEye Labs Advanced Reverse Engineering (FLARE) script series to an invaluable tool for the reverse engineer – the debugger. Just like IDA Pro, debuggers have scripting interfaces. For example, OllyDbg uses an asm-like scripting language, the Immunity debugger...
https://www.fireeye.com/blog/threat-research/2015/12/flare_script_series.html   
Published: 2015 12 28 14:01:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: FLARE Script Series: Automating Obfuscated String Decoding - published almost 9 years ago.
Content: Introduction We are expanding our script series beyond IDA Pro. This post extends the FireEye Labs Advanced Reverse Engineering (FLARE) script series to an invaluable tool for the reverse engineer – the debugger. Just like IDA Pro, debuggers have scripting interfaces. For example, OllyDbg uses an asm-like scripting language, the Immunity debugger...
https://www.fireeye.com/blog/threat-research/2015/12/flare_script_series.html   
Published: 2015 12 28 14:01:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: FLARE IDA Pro Script Series: Simplifying Graphs in IDA - published almost 7 years ago.
Content: Introduction We’re proud to release a new plug-in for IDA Pro users – SimplifyGraph – to help automate creation of groups of nodes in the IDA’s disassembly graph view. Code and binaries are available from the FireEye GitHub repo. Prior to this release we submitted it in the 2017 Hex-Rays plugin contest, where it placed third overall. My perso...
https://www.fireeye.com/blog/threat-research/2018/01/simplifying-graphs-in-ida.html   
Published: 2018 01 11 16:45:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: FLARE IDA Pro Script Series: Simplifying Graphs in IDA - published almost 7 years ago.
Content: Introduction We’re proud to release a new plug-in for IDA Pro users – SimplifyGraph – to help automate creation of groups of nodes in the IDA’s disassembly graph view. Code and binaries are available from the FireEye GitHub repo. Prior to this release we submitted it in the 2017 Hex-Rays plugin contest, where it placed third overall. My perso...
https://www.fireeye.com/blog/threat-research/2018/01/simplifying-graphs-in-ida.html   
Published: 2018 01 11 16:45:00
Received: 2022 05 23 16:06:47
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security

All Articles

Ordered by Date Received : Year: "2022" Month: "05" Day: "23"
Page: << < 3 (of 10) > >>

Total Articles in this collection: 514


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor