Home | Latest News | Popular News | Our Network | About | Contact
Security Research News | www.SecurityPhresh.com
Security Research News
Showing 'Security Research News' from 21 to 30
Latest Spam Campaigns From TA505 Now Using New Malware Tools Gelup And FlowerPippi
4th Jul 2019 [12 days ago] from TrendMicro
Since our last research on TA505, we have observed new activity from the group that involves campaigns targeting different countries over the last few weeks. We found them targeting countries in the Middle East such as United Arab Emirates...
NHS Warned To Act Now To Keep Hackers At Bay
3rd Jul 2019 [13 days ago] from ESET Research
A trifecta of issues impact the organization’s cyber-resilience and conspire to put it in the firing line of cyberattacks The post NHS warned to act now to keep hackers at bay appeared first on WeLiveSecurity
Incident Response With NTFS INDX Buffers – Part 4: The Internal Structures Of An INDX Attribute
2nd Jul 2019 [14 days ago] from FireEye Research
By Jeff Hamm William Ballenthin On August 30th, 2012,we presented a webinar on how to use INDX buffers to assist in anincident response investigation. You can review an archivedrecording of this presentation here.This four part blog post...
Incident Response With NTFS INDX Buffers - Part 3: A Step By Step Guide To Parse INDX
2nd Jul 2019 [14 days ago] from FireEye Research
By William Ballenthin Jeff Hamm Our lastpost in the Incident Response with NTFS INDX Buffers seriesdetailed the internal structures of the NTFS filename attribute. Inthis post, well use a tool to parse the active contents of INDXrecords...
Incident Response With NTFS INDX Buffers – Part 2: The Internal Structures Of A File Name Attribute
2nd Jul 2019 [14 days ago] from FireEye Research
By Jeff Hamm William Ballenthin Last week onM-Unition, Willi and I published the first post in the NTFSINDX Buffers series. The first post explained how to extractan INDX attribute using various tools. In part two of the series,we detail...
Incident Response With NTFS INDX Buffers – Part 1: Extracting An INDX Attribute
2nd Jul 2019 [14 days ago] from FireEye Research
By William Ballenthin Jeff Hamm On August 30, 2012, wepresented a webinaron how to use INDX buffers to assist in anincident response investigation. During the QA portion ofthe webinar we received many questions; however, we were not able...
Two Billion User Logs Leaked By Smart Home Vendor
2nd Jul 2019 [14 days ago] from ESET Research
The leak, which apparently has yet to be plugged, exposes a range of very specific data about users The post Two billion user logs leaked by smart home vendor appeared first on WeLiveSecurity
Microsoft’s Threat & Vulnerability Management Now Helps Thousands Of Customers To Discover, Prioritize, And Remediate Vulnerabilities In Real...
2nd Jul 2019 [14 days ago] from Microsoft
Microsoft’s Threat & Vulnerability Management solution is generally available as of June 30! We have been working closely with customers for more than a year to incorporate their real needs and feedback to better address vulnerability...
A Quick And Efficient Method For Locating The Main() Function Of Linux ELF Malware Variants
2nd Jul 2019 [14 days ago] from TrendMicro
In the past few years, Linux systems have been susceptible to attacks involving ransomware, cryptocurrency miners, botnets and other types of malware. The successful deployment of the said attacks refutes an old notion that machines and...
Delivering Major Enhancements In Windows Defender Application Control With The Windows 10 May 2019 Update
1st Jul 2019 [15 days ago] from Microsoft
With the Windows 10 May 2019 Update we delivered several important features for Windows Defender Application Control. Our focus for this release was responding to some longstanding feedback on manageability improvements. We’re excited...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »