Quantcast
Channel: Threat Geek
Browsing latest articles
Browse All 87 View Live

Image may be NSFW.
Clik here to view.

Understanding the SmokeLoader Downloader

 Downloaders and droppers (aka malware that delivers other malware) have been forced to live in the shadow of more famous stages of the exploit kit chain, like landing pages or the malware that's...

View Article


Image may be NSFW.
Clik here to view.

Modern Messaging OPSEC: Popular App Gives Scammers a Boost

 Modern messaging apps, many of which offer end-to-end encryption, are used every day by millions of people. These apps come with the expectation of privacy. However, we recently observed an...

View Article


Image may be NSFW.
Clik here to view.

5 Requirements for Stopping Modern Intrusions

 There’s a reason why airport security x-rays your bags. It’s because the only way you can tell if something is a true threat is to actually look at the contents.It’s the same with network security....

View Article

Image may be NSFW.
Clik here to view.

WIDESPREAD EXPLOITATION ATTEMPTS USING CVE-2017-5638

 Many research teams have reported on their observations of exploits involving the use of the Apache Struts vulnerability CVE-2017-5638 since Cisco Talos published their post on Wednesday March 8....

View Article

Image may be NSFW.
Clik here to view.

Phind the Phish - Reducing Phishing Detection from Months to Minutes

 Every day, attackers tunnel under, sneak through, go around, go over and squeeze past your security technologies.While you’re armed with more security tools than you can count, most of them are hiding...

View Article


Image may be NSFW.
Clik here to view.

Using Yara for Intrusion Prevention

 Nviso Labs recently published a fascinating blog post illustrating the use of the Lua programming language over the Suricata DPI engine to detect obfuscations in PDF files. Deep analysis of content...

View Article

Image may be NSFW.
Clik here to view.

CISO, Welcome to the Boardroom: New Regulations Likely to Impact CISO Role

 Interesting changes are happening in the world of cybersecurity legislation. Notably, these changes are impacting the role of the chief information security officer (CISO). No longer are CISOs just...

View Article

Image may be NSFW.
Clik here to view.

Going Back in Time: Investigating Threats Retroactively

 Welcome back to reducing detection time from months to minutes. In the first post in this series, we showed how metadata holds the power to quickly disarm one of the most effective cyberattack methods...

View Article


Image may be NSFW.
Clik here to view.

Operation TradeSecret: Cyber Espionage at the Heart of Global Trade

  In late February, Fidelis Cybersecurity observed a strategic web compromise on a prominent U.S. lobbying group that served up malware to a very specific set of targets. The malware we observed has...

View Article


Image may be NSFW.
Clik here to view.

Reducing Detection from Months to Minutes: Detecting Credentials in the Clear

Welcome back to our blog series on reducing detection time from months to minutes. In our first and second posts, we showed how you can use metadata to quickly resolve phishing attacks and investigate...

View Article
Browsing latest articles
Browse All 87 View Live