Trend Micro recently patched its Anti-Threat Toolkit (ATTK) for a high-grade remote software execution vulnerability. The Trend Micro ATTK tool lets users...
RITA is an open source framework for network traffic analysis. The framework ingests Bro/Zeek Logs in TSV format, and currently supports...
DeTT&CT aims to assist blue teams using ATT&CK to score and compare data log source quality, visibility coverage, detection coverage and threat...
These files contain configuration for producing EDR (endpoint detection and response) data in addition to standard system logs. These configurations enable...
You know about cyber security and mobile network vulnerabilities. You’ve heard of DDoS attacks. You might have even moved on from your...
Machine Learning for Threat Intuitive Analysis The goal of the ManaTI project is to develop machine learning techniques to assist an...
Owning an online store can be a fabulous and lucrative venture in today’s marketplace. With so many sales and transactions taking place...
Advanced Threat Protection, or ATP, is a type of security solution specifically designed to defend a network or system from sophisticated hacking...
Today, criminal organizations no longer attack corporations and businesses physically with weapons. Instead, they use computers and malware, aiming to steal vital...
Enterprises face the tough challenge of ensuring the security of their IT infrastructure. Data breach attempts have now become commonplace as customer...
This is a Splunk application containing several dashboards and over 120 reports that will facilitate initial hunting indicators to investigate. You obviously...
Huawei is stuck in a political tug of war between different countries. After facing a brief ban in the US, the world’s...
Digital extortion continues to pose a threat everywhere. According to the Cyber Advisor newsletter, incidents of ransomware attacks are only going to...
A new family of Android ransomware has been discovered, which spreads via SMS. This comes after a two-year decline in the spread...
OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. It has been created in...
Ruby users who updated with strong_password gem version 0.0.7 are urged to roll back to the previous versions after a developer discovered...
Story of an Advanced Persistent Threat attack against a large corporation that started with a series of blank emails. Advanced persistent threats...
The Antivirus Company Avast issued an alert on Monday about the spread of a virus that attempts to infect Brazilians smartphones and...
In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to...
Organizations and red teamers can utilize zBang to identify potential attack vectors and improve the security posture of the network. The results...
An improvised automated threat intelligent system with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced...