Sponsored by Keepnet Labs

Security Review / Reports

Train your Threat Hunting Skills

Train your Threat Hunting Skills One of my best friends, my partner in conferences, books, family friend Milad Aslaner wrote a great PowerShell simulation which can help you train your Threat Hunting skills. The good news is its completley FREE , below are the details and download link : Introduction ThreatHunt is a simple PowerShell repository that allows you to train your [...]


Free Internet Security Threat Report

Free Internet Security Threat Report by Symantec 2019

Free Internet Security Threat Report Formjacking. Targeted Attacks. Living off the Land. Coming for Your Business. Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights from the world’s largest civilian global intelligence network, revealing: Formjacking attacks skyrocketed, with an average of 4,800 websites compromised each month. Ransomware shifted targets from consumers to enterprises, where infections rose 12 percent. More than 70 [...]


Virus Bulletin : Lazarus Group a mahjong game played with different sets 0f tiles

Lazarus Group a mahjong game played with different sets of tiles Please go ahead and click the link below to read the full article .  Below is a summary for the ones who want see what's in the article : https://www.virusbulletin.com/virusbulletin/2019/06/vb2018-paper-lazarus-group-mahjong-game-played-different-sets-tiles/#ref25 The number of incidents attributed to the Lazarus Group, a.k.a. Hidden Cobra, has grown rapidly since its estimated establishment in 2009. [...]


Posted By Category: Cyber Security, Security Review / ReportsTags: , Comments: 1
Does Apple spy on iPhone ?

Apple and Privacy

Apple and Privacy Does really Apple cares about your privacy, as they advertise heavily or is this what they want us to believe? Compared to Google and Facebook they are by far better in terms of privacy as of today! But are they really angels? Or do they still collect lots of information by default and if they do, what can [...]


Security Exploit

New Windows 10 Security Exploit Can Read All Your Files – What You Need To Know

New Windows 10 Security Exploit A security researcher with a history of releasing zero-day exploits for the Windows operating system has struck again; this time just days after the latest Patch Tuesday security updates were rolled out. Which means that it’s unlikely there will be a fix for Windows 10 users until June 11 at the earliest. So what did [...]


Data Breach

Verizon Data Breach Investigations Report 2019

Verizon Data Breach Investigations Report Understanding the threats can help you manage risk effectively. The threats are real, the attackers motivated. But something standsbetween them and your organization's data: you and your securityteams, with the insight, perspective, and tools to take action. You'll find that all  right here. To download the report : https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf Online Version of the report : https://enterprise.verizon.com/resources/reports/dbir/2019/introduction/ Major findings in summary The DBIR [...]


vulnerability

Acunetix Web Application Vulnerability Report 2019 – Free download

Acunetix compiles an annual web application vulnerability report in order to provide security experts and interested parties with an analysis of data on vulnerabilities gathered over the previous year. The 2019 report contains the results and analysis of vulnerabilities, detected from the automated web and network perimeter scans run on the Acunetix Online platform, over a 12 month period, across [...]


Why researching IT Security?

Why researching IT Security There is nearly every week an IT Security incident, more and more corporations and individuals are getting hit by Cyber Criminals. Based on commercial Kaspersky Security Bulletin (Kaspersky Security Bulletin, 2017) and Symantec Security report (Symantec Internet Security Threat Report ) the number of IT-related attacks are increasing and more end users are getting affected. And the researcher aims to find better ways [...]


Data Breach

Microsoft Security Intelligence Report (SIR) v18

Volume 18 of the Microsoft Security Intelligence Report (SIR) is now available. The Microsoft Security Intelligence Report (SIR) analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. Threat awareness can help you protect your organization, software, and people. This volume of the SIR focuses on the second [...]