Using Real-Time Events in Investigations
May 14 2020To understand what a threat actor did on a Windows system, analysts often turn to the tried and true sources of historical endpoint artifacts such as the...
Read moreTo understand what a threat actor did on a Windows system, analysts often turn to the tried and true sources of historical endpoint artifacts such as the...
Read moreTo understand what a threat actor did on a Windows system, analysts often turn to the tried and true sources of historical endpoint artifacts such as the...
Read moreThe framework is designed to collect and exfiltrate sensitive documents from air-gapped networks. Researchers have found a new cyber-espionage framework developed to collect and exfiltrate sensitive files from air-gapped...
Read moreA thumbprint may be a good authentication factor for the living, but are you prepared to access mission-critical data and devices after an employee’s death? As Kacey Clark,...
Read moreWhile some users are up to speed with the WFH protocol, it’s worth adding a few more items to your security checklist. There’s good news and bad news as...
Read moreThis marks the third month in a row that Microsoft patched more than 100 bugs, of which 16 are classified as critical. Microsoft today released fixes for 111 vulnerabilities...
Read moreMicrosoft today issued software updates to plug at least 111 security holes in Windows and Windows-based programs. None of the vulnerabilities were labeled as being publicly exploited or detailed...
Read moreThreat actors have pivoted from noisy attacks to intrusions where stealth and ROI are primary goals, new report says. Threat actors are pivoting away from noisy website attacks to...
Read moreUsing a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons. Three years ago,...
Read moreUsing a known exploit to infect unmaintained systems, the WannaCry ransomware worm remains a study in preventable catastrophes. Yet many companies continue to ignore its lessons. Three years ago,...
Read more
Recent Comments