Security Review / Reports

EDR

WHY EDR SOLUTION IS BETTER THAN ANTIVIRUS ?

WHY EDR SOLUTION IS BETTER THAN ANTIVIRUS Let's start first with the definition of EDR or Endpoint Detection and Response. It is an endpoint security solution that monitors end-user devices to detect and respond to cyber threats, it also  records and stores endpoint-system-level behaviors (logs), uses various data analytics techniques to  block malicious activities and provides remediation suggestions to restore affected...


Train your Threat Hunting Skills

Train your Threat Hunting Skills One of my best friends, my partner in conferences, books, family friend Milad Aslaner wrote a great PowerShell simulation which can help you train your Threat Hunting skills. The good news is its completley FREE , below are the details and download link : Introduction ThreatHunt is a simple PowerShell repository that allows you to train your threat...


Free Internet Security Threat Report

Free Internet Security Threat Report by Symantec 2019

Free Internet Security Threat Report Formjacking. Targeted Attacks. Living off the Land. Coming for Your Business. Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights from the world’s largest civilian global intelligence network, revealing: Formjacking attacks skyrocketed, with an average of 4,800 websites compromised each month. Ransomware shifted targets from consumers to enterprises, where infections rose 12 percent. More than 70 million...


Virus Bulletin : Lazarus Group a mahjong game played with different sets 0f tiles

Lazarus Group a mahjong game played with different sets of tiles Please go ahead and click the link below to read the full article .  Below is a summary for the ones who want see what's in the article : https://www.virusbulletin.com/virusbulletin/2019/06/vb2018-paper-lazarus-group-mahjong-game-played-different-sets-tiles/#ref25 The number of incidents attributed to the Lazarus Group, a.k.a. Hidden Cobra, has grown rapidly since its estimated establishment in 2009. This...


Does Apple spy on iPhone ?

Apple and Privacy

Apple and Privacy Does really Apple cares about your privacy, as they advertise heavily or is this what they want us to believe? Compared to Google and Facebook they are by far better in terms of privacy as of today! But are they really angels? Or do they still collect lots of information by default and if they do, what can you...


Security Exploit

New Windows 10 Security Exploit Can Read All Your Files – What You Need To Know

New Windows 10 Security Exploit A security researcher with a history of releasing zero-day exploits for the Windows operating system has struck again; this time just days after the latest Patch Tuesday security updates were rolled out. Which means that it’s unlikely there will be a fix for Windows 10 users until June 11 at the earliest. So what did SandboxEscaper...


Data Breach

Verizon Data Breach Investigations Report 2019

Verizon Data Breach Investigations Report Understanding the threats can help you manage risk effectively. The threats are real, the attackers motivated. But something standsbetween them and your organization's data: you and your securityteams, with the insight, perspective, and tools to take action. You'll find that all  right here. To download the report : https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf Online Version of the report : https://enterprise.verizon.com/resources/reports/dbir/2019/introduction/ Major findings in summary The DBIR continues...


vulnerability

Acunetix Web Application Vulnerability Report 2019 – Free download

Acunetix compiles an annual web application vulnerability report in order to provide security experts and interested parties with an analysis of data on vulnerabilities gathered over the previous year. The 2019 report contains the results and analysis of vulnerabilities, detected from the automated web and network perimeter scans run on the Acunetix Online platform, over a 12 month period, across more...


Why researching IT Security?

Why researching IT Security There is nearly every week an IT Security incident, more and more corporations and individuals are getting hit by Cyber Criminals. Based on commercial Kaspersky Security Bulletin (Kaspersky Security Bulletin, 2017) and Symantec Security report (Symantec Internet Security Threat Report ) the number of IT-related attacks are increasing and more end users are getting affected. And the researcher aims to find better ways to...


Data Breach

Microsoft Security Intelligence Report (SIR) v18

Volume 18 of the Microsoft Security Intelligence Report (SIR) is now available. The Microsoft Security Intelligence Report (SIR) analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide. Threat awareness can help you protect your organization, software, and people. This volume of the SIR focuses on the second half...