Here's the latest podcast - listen now!
Read moreSVR Attacks on Microsoft 365
January 21 2021
FireEye is reporting the current known tactics that the SVR used to compromise Microsoft 365 cloud data as part of its SolarWinds operation:
Mandiant has observed UNC2452 and other...
Read more
Microsoft Releases New Info on SolarWinds Attack Chain
January 21 2021Threat actors went to elaborate lengths to maintain operational security around second-stage payload activation, company says.
Read moreDuring Senate confirmation hearings, the nominees for Secretary of Homeland Security and Director of National Intelligence pledged to focus on cybersecurity.
Read moreHas the coronavirus pandemic affected Apple’s hardware design?
January 20 2021The more things change... the more they stay the same!
Read moreEmulation of Kernel Mode Rootkits With Speakeasy
January 20 2021In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreEmulation of Kernel Mode Rootkits With Speakeasy
January 20 2021In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreEmulation of Kernel Mode Rootkits With Speakeasy
January 20 2021In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreEmulation of Kernel Mode Rootkits With Speakeasy
January 20 2021In August 2020, we released a blog post about how the Speakeasy emulation framework can be used to emulate user mode malware such as shellcode. If you...
Read moreTips for a Bulletproof War Room Strategy
January 20 2021The techniques used in real-world combat apply in cybersecurity operations, except that instead of bullets flying downrange, it's packets.
Read more
Recent Comments