Microsoft Releases New Info on SolarWinds Attack Chain
January 21 2021Threat actors went to elaborate lengths to maintain operational security around second-stage payload activation, company says.
Read moreThreat actors went to elaborate lengths to maintain operational security around second-stage payload activation, company says.
Read moreDuring Senate confirmation hearings, the nominees for Secretary of Homeland Security and Director of National Intelligence pledged to focus on cybersecurity.
Read moreThe more things change... the more they stay the same!
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreIn August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreThe techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets.
Read more
Google’s Project Zero has exposed a sophisticated watering-hole attack targeting both Windows and Android:
Some of the exploits were zero-days, meaning they targeted vulnerabilities that at the time were...
Read more
Seven flaws in DNSMasq have limited impact, but in combination they could be chained to create a multistaged attack.
Read more
Recent Comments