Security Review / Reports

Train your Threat Hunting Skills

One of my best friends, my partner in conferences, books, family friend Milad Aslaner wrote a great PowerShell simulation which can help you train your Threat Hunting skills. The good news is its completley FREE , below are the details and download link : Introduction ThreatHunt is a simple PowerShell repository that allows you to train your threat hunting skills. [...]


Symantec 2019 Internet Security Threat Report.

Formjacking. Targeted Attacks. Living off the Land. Coming for Your Business. Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights from the world’s largest civilian global intelligence network, revealing: Formjacking attacks skyrocketed, with an average of 4,800 websites compromised each month.Ransomware shifted targets from consumers to enterprises, where infections rose 12 percent.More than 70 million records stolen from [...]


Virus Bulletin : Lazarus Group: a mahjong game played with different sets of tiles

Please go ahead and click the link below to read the full article .  Below is a summary for the ones who want see what's in the article : https://www.virusbulletin.com/virusbulletin/2019/06/vb2018-paper-lazarus-group-mahjong-game-played-different-sets-tiles/#ref25 The number of incidents attributed to the Lazarus Group, a.k.a. Hidden Cobra, has grown rapidly since its estimated establishment in 2009. This notorious group intensified its efforts in 2017 (e.g. [...]


Posted By Category: Cyber Security, Security Review / ReportsTags: , Comments: 0

CROWDSTRIKE GLOBAL THREAT REPORT 2019

Adversary Tradecraft and The Importance of Speed The 2019 CrowdStrike® Global Threat Report offers one of the industry’s most comprehensive reports on today’s top cyberthreats. It combines analysis from CrowdStrike Threat Intelligence, Falcon OverWatch™ managed hunting and the CrowdStrike Services incident response teamshighlighting the most significant events and trends in the past year. It combines CrowdStrike’s comprehensive global observations with real-world case studies to [...]


Apple and Privacy

Does really Apple cares about your privacy, as they advertise heavily or is this what they want us to believe? Compared to Google and Facebook they are by far better in terms of privacy as of today! But are they really angels? Or do they still collect lots of information by default and if they do, what can you [...]


New Windows 10 Security Exploit Can Read All Your Files – What You Need To Know

A security researcher with a history of releasing zero-day exploits for the Windows operating system has struck again; this time just days after the latest Patch Tuesday security updates were rolled out. Which means that it’s unlikely there will be a fix for Windows 10 users until June 11 at the earliest. So what did SandboxEscaper just drop into [...]


Verizon 2019 Data Breach Investigations Report

Understanding the threats can help you manage risk effectively. The threats are real, the attackers motivated. But something standsbetween them and your organization's data: you and your securityteams, with the insight, perspective, and tools to take action. You'll find that all  right here. To download the report : https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf Online Version of the report : https://enterprise.verizon.com/resources/reports/dbir/2019/introduction/ Major findings in summary The DBIR continues to deliver comprehensive data-driven [...]


Acunetix Web Application Vulnerability Report 2019

Acunetix compiles an annual web application vulnerability report in order to provide security experts and interested parties with an analysis of data on vulnerabilities gathered over the previous year. The 2019 report contains the results and analysis of vulnerabilities, detected from the automated web and network perimeter scans run on the Acunetix Online platform, over a 12 month [...]


Microsoft Security Intelligence Report Volume 24

The 24th edition of the Microsoft Security Intelligence Report (SIR) is now available. The report is a reflection on last year’s security events and includes an overview of the security landscape, lessons learned from the field, and recommended best practices. To create this report, the SIR team culled core insights and key trends out of a year’s [...]


Why researching IT Security?

There is nearly every week an IT Security incident, more and more corporations and individuals are getting hit by Cyber Criminals. Based on commercial Kaspersky Security Bulletin (Kaspersky Security Bulletin, 2017) and Symantec Security report (Symantec Internet Security Threat Report ) the number of IT-related attacks are increasing and more end users are getting affected. And the researcher aims to find better ways to make anyone [...]