Tag: IFTTT
-
Inconsistencies in Intelligence Collection » Digital Shadows
Inconsistencies in Intelligence Collection » Digital Shadows http://ift.tt/293gOzZ See it on Scoop.it, via Advanced Threats,Intelligence Technology,CyberSecurity APT via Advanced Threats,Intelligence Technology,CyberSecurity | Scoop.it http://ift.tt/1PrSk69 June 28, 2016 at 11:28AM
-
Hacked 31+ Domains of Google Inc. via /r/netsec
Hacked 31+ Domains of Google Inc. http://ift.tt/297mag0 Submitted June 29, 2016 at 12:52PM by Literally_Badass via reddit http://ift.tt/29ooPQE
-
An Immediate Starting Point for Research on Threat Actor Groups
Key Takeaways Recorded Future launches a new Intel Card for threat actor groups. Get content-rich, real-time alerts on new threat actor group activity. No more deciphering threat actor group aliases; get consolidated views of associated TTPs and IOCs. Researching and analyzing threat actor groups requires a significant effort in both time and resource. Identifying if…
-
Half Of CEOs Have Fallen Victim To Phishing Attacks
Half Of CEOs Have Fallen Victim To Phishing Attacks http://ift.tt/29c1jaL CEOs need training to avoid phishing scams Half of chief executives have fallen victim to a phishing attack, indicating that they lack the right cyber security training to protect themselves. Research conducted by threat intelligence firm AlienVault found that 82 per cent of IT…
-
Auditing CSP headers with Burp and ZAP via /r/netsec
Auditing CSP headers with Burp and ZAP http://ift.tt/290pivn Submitted June 28, 2016 at 04:10PM by h3xstream_ via reddit http://ift.tt/291uZ9w
-
The 101 of Ransomware
The 101 of Ransomware http://ift.tt/290JqgO Ransomware is a type of malware that restricts access to infected computers and requires victims to pay something in order to regain full access to their data. Spear phishing and email are the most common methods for spreading ransomware. Drive-by download is a term becoming more popular, and it is….…
-
Troublemaking Bart ransomware follows in Dridex and Locky’s footsteps
Troublemaking Bart ransomware follows in Dridex and Locky’s footsteps http://ift.tt/290Jhdt A newly discovered ransomware named Bart doesn’t need to connect with a command-and-control server in order to encrypt victims’ files, meaning even the strongest corporate firewalls may be unable to stop Bart from rendering a PC ineffective. Threat Intel via CERT-EU : EMM AlertFilter System:…
-
MS16-039 – “Windows 10” 64 bits Integer Overflow exploitation by using GDI objects via /r/netsec
MS16-039 – “Windows 10” 64 bits Integer Overflow exploitation by using GDI objects http://ift.tt/290mY7J Submitted June 28, 2016 at 05:51PM by erkaman via reddit http://ift.tt/298bIVL
-
Chrome DRM Vulnerability Can be Exploited to Copy Streamed Movies (June 24 and 27, 2016)
Chrome DRM Vulnerability Can be Exploited to Copy Streamed Movies (June 24 and 27, 2016) http://ift.tt/29llrGd SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web…
-
Russian APT Launched Massive Spear-Phishing Campaign Targeting Google Accounts
Russian APT Launched Massive Spear-Phishing Campaign Targeting Google Accounts http://ift.tt/292A7OP Dell’s SecureWorks Counter Threat Unit (CTU) detected a massive phishing campaign targeting the Google accounts of military personnel, government officials, journalists and political activists in the US, EU, Russia, and former Soviet states. The security vendor discovered the phishing campaign after…. Threat Intel via CERT-EU…