Sponsored by Keepnet Labs

Tag - Malware

Webinar : The Most Prevalent Discovery Technique

Join me with Picus Security where we will talk about t "The Most Prevalent Discovery Technique ATT&CK: T1082 System Information Discovery" On September 10th, Dr. Erdal Ozkaya from Standard Chartered Bank will join Picus for the live webinar and we'll talk about T1082 System Information Discovery! Save your seat & join us on September 10th to discover: How do adversaries leverage 'System [...]


10 years of virtual dynamite: A high-level retrospective of ATM malware

POSTED BY VANJA SVAJCE via Talos Intelligence Executive summary It has been 10 years since the discovery of Skimer, first malware specifically designed to attack automated teller machines (ATMs). At the time, the learning curve for understanding its functionality was rather steep and analysis required specific knowledge of a manufacturer's ATM API functions and parameters, which were not publicly documented.  Before the [...]


How Hackers Get your Password?

It’s not a secret anymore, Hackers know our passwords.  551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers use to steal your [...]


Recommended web sites for IT Security Pros

As a Trusted Security Advisor at Microsoft, I used to receive if not hundreds, tens of emails nearly every day from people across the globe asking my help on how they become a Security Professional.Of course, this is not a one-night thing, or there is no secret recipe or a short cut, to be "The Security Guy". I am [...]


Free Course: Hacking Countermeasures

In this FREE COURSE subject, students will learn how to scan, test, hack and secure computing systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work before learning to scan and attack networks. Students will be prepared for the EC-Council Certified Ethical [...]


Fight against Malware

Let's face it, Windows machines can get hijacked if you happen to be on the wrong place at the wrong time. Fortunately, Microsoft has built numerous tools into Windows so administrators and power users can analyze systems to determine whether and how they've been compromised. But many of us are not even take this in to consideration! In [...]


Malware: past, present and future.

This article is about Malwares, from the past , to present and their future, I hope you will like it... Introduction: Before we get into the specifics of how to malware history, present and past I believe we need to define some terminology, cover common types of malware, and introduce the fundamental approaches to malware analysis to identify and highlight the [...]