Tag: Feedly
-
ForeScout Joins Splunk’s Adaptive Response Initiative
ForeScout Joins Splunk’s Adaptive Response Initiative http://ift.tt/2cLbipr ForeScout Technologies, Inc. and Splunk Inc. announced that ForeScout has joined Splunk’s Adaptive Response Initiative. Powered by a growing list of leading cybersecurity technology vendors, Adaptive Response is a best-of-breed security initiative that leverages end-to-end context and continuous…. Threat Intel via CERT-EU : EMM AlertFilter System: CERT-LatestNews http://ift.tt/1gYYfLb…
-
Rig Exploit Kit from the Afraidgate Campaign, (Wed, Sep 28th)
Rig Exploit Kit from the Afraidgate Campaign, (Wed, Sep 28th) http://ift.tt/2dqcvWb Introduction Yesterday on Tuesday 2016-09-27, the Afraidgate campaign switched from Neutrino exploit kit (EK) to Rig EK [1]. As we go into Wednesday 2016-09-28, this trend continues. So let’s examine another case of Afraidgate using Rig EK! Details The Afraidgate campaign has been sending…
-
SWIFT Toughens Customer Security With New Mandatory Rules
SWIFT Toughens Customer Security With New Mandatory Rules http://ift.tt/2drbIUY SWIFT Toughens Customer Security With New Mandatory Rules Measures to include set of core safety standards and assurance framework requiring annual self-attestation by SWIFT members. In a move towards strengthening customer security, SWIFT — the financial services secure messaging network that has been leveraged by attackers…
-
Locky Ransomware Drops Offline Mode
Locky Ransomware Drops Offline Mode http://ift.tt/2dCwAqX Locky, one of the most prolific ransomware families this year, has changed its modus operandi once again by adopting a new extension that is appended to encrypted files. First observed in February, when it stood out because it could encrypt files on unmapped network shares, Locky was originally renaming the…
-
Cisco Cracks GozNym Trojan DGA, Sinkholes Botnet
Cisco Cracks GozNym Trojan DGA, Sinkholes Botnet http://ift.tt/2drdjFu An extensive analysis of the hybrid Trojan dubbed GozNym has allowed Cisco researchers to reverse engineer its domain generation algorithm (DGA) and start sinkholing botnets that rely on the malware. The existence of GozNym, which is a combination between the Nymaim dropper and the Gozi ISFB banking…
-
TheDarkOverlord holds investment bank to ransom, or else hacked files will be released
TheDarkOverlord holds investment bank to ransom, or else hacked files will be released http://ift.tt/2d45AyE No-one knows who TheDarkOverlord is. No-one even knows if he or she is one lone hacker, or a group of hackers. But one thing is certain, TheDarkOverlord must be giving some companies sleepless nights as they struggle to work out the…
-
Fancy Bear Hackers use a new Mac Trojan against aerospace industry
Fancy Bear Hackers use a new Mac Trojan against aerospace industry http://ift.tt/2dobvxf Researchers at Palo Alto spotted a new campaign of the Russian Fancy Bear APT using a new Mac OS X Trojan against companies in the aerospace industry. In the last weeks, we have discussed a lot about a string of attacks that targeted the US Democratic…
-
Talos ShadowGate Take Down: Global Malvertising Campaign Thwarted
Talos ShadowGate Take Down: Global Malvertising Campaign Thwarted http://ift.tt/2czXEqJ Cisco’s research team Talos posted a interesting article on their recently work with GoDaddy to take down large malvertising campaign. The original post can be found HERE. This article includes a fantastic explanation of exploit kits and gates. Exploit kits are a class of threat that…
-
Microsoft pushes its three pillars at Ignite—security, intelligence, and cloud – Ars Technica
Microsoft pushes its three pillars at Ignite—security, intelligence, and cloud – Ars Technica http://ift.tt/2dzbMkf Microsoft reader comments 45 ATLANTA—At its Ignite conference today, Microsoft’s Scott Guthrie, executive vice president for cloud and enterprise, explained that the company wants IT professionals to feel empowered and digitally transform their organizations. Accordingly, Microsoft is focusing on three areas…
-
Microsoft equips Edge with hardware-based container
Microsoft equips Edge with hardware-based container http://ift.tt/2dgfOtE Microsoft has announced a new capability that will make its Edge browser the most secure web browsing option for enterprises: Windows Defender Application Guard. Windows Defender Application Guard is a lightweight virtual machine that prevents malicious activity coming from the web from reaching the operating system, apps, data,…