MHT恶意文档投递及免杀研究
报告编号: B6-2018-091801 报告来源: 360-CERT 报告作者: Khwarezmia_,merjerson 更新日期: 2018-09-18 0x00 概述 近日360 CERT关注到ISC发布一篇关于mht文档的分析文章[ Malware Delivered Through MHT Files ] ,该文章详细讲述了如何生成mht文档以及对其生成的恶意文档进行查杀效果测试。...
View ArticleSecurity Token Offerings a new crypto trend that might bring appealing benefi...
With numerous FinTech trends emerging over the last years, more people have directed their focus towards investment opportunity revolving around cryptocurrencies and towards Initial Coin Offerings for...
View Article第十二期“安全+”端点安全沙龙成功举办
2018年9月14日,“ 安全+ ”在上海汤臣洲际酒店成功举办了主题为“ 端点安全 ”的第十二期沙龙。 沙龙围绕UEBA在企业落地的探索、基于开放工具和威胁情报的EDR、企业终端安全实践、员工侧安全综合解决方案实践、DDOS攻击的防御方法等热点话题展开热烈的讨论和交流。来自平安科技、美丽联合、华泰证券、华福证券、WiFi万能钥匙、饿了么、交通银行、携程、爱奇艺、Adidas、京东1号店、 中国...
View ArticleMeet Your IoT Security Solution: Same as Your IT Security Solution
With the spread of the Internet of Things, and the increasing dangers associated with same , the likelihood that we’re going to be faced with a deluge of new “solutions” is high. It will not be long...
View ArticleDelta Data Launches Proprietary Product Manager
New digital portal significantly eases operational strain associated with creating and managing proprietary products COLUMBUS, Ga. (BUSINESS WIRE) Delta Data, a leading provider of software and data...
View ArticleC'mon, biz: Give white hats a chance to tell you how screwed you are
There have never been more white-hat researchers hunting for vulnerabilities on internet-facing systems and yet barely any organisations provide a way for them to report the issues they find. In...
View Article区块链+网络安全,未来你的电脑还怕恶意攻击吗?
就在9月17日,成都安全网络博览会在成都世纪城新国际展览中心1号馆、2号馆开幕。本届博览会以网络安全为主题,展示了卫星互联网、区块链、人工智能等信息技术的迭代发展,引发人们关注,在全新形势下,面临的机遇和挑战。...
View ArticleApp Security Disasters in eCommerce
javascript's days as an infant front-end development language are long gone. During the last few years, it has exploded in popularity. An overwhelming 95% of websites are running JavaScript on their...
View ArticleAI could be the secret weapon of the security industry
AI could be the key to stopping cybercriminals hijackingIoT devices to attack businesses, new research has claimed. New research from Aruba has found that AI can help boost the usefulness and...
View ArticleZero Trust Security Architectures
This introduction is Part 1 of a 5 part blog series. Introduction Most enterprises today operate hundreds of applications that support core business practices and were developed years ago with the same...
View ArticleNVR Software Flaw Threatens Thousands of Devices
A network video recorder (NVR) application used by organizations from around the world to control surveillance cameras contains a critical vulnerability that could expose devices to hacking. The flaw...
View ArticleYour Chatbot Could Be Vulnerable to Cybercriminals
Surely, you’ve heard of a particularly sophisticated type of cybersecurity threat called phishing. Varying forms exist, but the most common is that a website or communication is designed to mimic...
View ArticleNew trends in the world of IoT threats
Cybercriminals’ interest in IoT devices continues to grow: in H1 2018 we picked up three times as many malware samples attacking smart devices as in the whole of 2017. And in 2017 there were ten times...
View ArticlePassword Algorithms: Skype (Windows)
Introduction There’s a fantastic article by Fabrice Desclaux and Kostya Kortchinsky which describes the encryption and structures used but doesn’t provide any code. The article indicates it isn’t...
View ArticleSymantec offers free anti-spoofing services to US political campaigns and...
is the latest private security company to offer its expertise to vulnerable political targets on the house. Today the company announced that it would extend its “ Project Dolphin ” service (dolphins...
View ArticleConvergence is the Key to Future-Proofing Security
I published a new article today on the Oracle Security blog that looks at the benefits of convergence in the security space as the IT landscape grows more disparate and distributed. Security...
View ArticleEnterprises need to adopt 'zero-trust' security posture
Privileged access management specialist Thycotic has released the results of its latest survey, conducted at this year's Black Hat, on hackers' perspectives on vulnerabilities and the attack vectors...
View ArticleManageEngine Strengthens Endpoint Security with the Launch of Browser...
Helps Organizations Tackle Surge in Browser-Based Cyberattacks Due to Increased Cloud Adoption Prevents, detects and fixes browser vulnerabilities to improve network health Free edition is perfect for...
View ArticleYour Cyber-Enemy May Not Be the Person You Suspect
Opinions expressed by Entrepreneur contributors are their own. Your worst nightmare might not be launched from an Eastern European boiler room full of cybergeniuses wielding stolen NSA exploits. It...
View ArticleApple Addresses Security Problems in iOS 12, Safari 12
Apple has released a new set of security fixes that address vulnerabilities in Safari, iOS , watchOS , and tvOS . It should be noted that some of the vulnerabilities were disclosed before the security...
View Article