Tag Archives: malware

Defensive Security Podcast Episode 186

http://www.bankinfosecurity.com/emory-healthcare-database-breach-what-happened-a-9745

http://www.networkworld.com/article/3176718/security/dealing-with-overwhelming-volume-of-security-alerts.html#tk.rss_security

http://www.networkworld.com/article/3175030/security/trend-micro-report-ransomware-booming.html

https://www.helpnetsecurity.com/2017/03/02/yahoo-cookie-forging-incident/

http://www.darkreading.com/risk/new-cybersecurity-regulations-begin-today-for-ny-banks/d/d-id/1328295

http://www.pcworld.com/article/3179348/security/after-cia-leak-intel-security-releases-detection-tool-for-efi-rootkits.html
https://arstechnica.com/security/2017/03/wikileaks-publishes-what-it-says-is-trove-of-cia-hacking-tools/
http://www.csoonline.com/article/3177994/security/cia-false-flag-team-repurposed-shamoon-data-wiper-other-malware.html

Defensive Security Podcast Episode 184

https://gallery.technet.microsoft.com/ATA-Playbook-ef0a8e38/file/169827/1/ATA%20Playbook.pdf

http://www.securityweek.com/google-shares-data-corporate-email-attacks

http://www.databreachtoday.com/reworked-ny-cybersecurity-regulation-takes-effect-in-march-a-9733

http://www.computerworld.com/article/3169386/security/recent-malware-attacks-on-polish-banks-tied-to-wider-hacking-campaign.html#tk.rss_security

http://www.computerworld.com/article/3166824/security/polish-banks-on-alert-after-mystery-malware-found-on-computers.html

http://www.forbes.com/sites/thomasbrewster/2017/02/16/dnc-fancy-bear-russia-hackers-mac-malware-hacking-team-fbi-fsb/#3998bc7812bc

Defensive Security Podcast Episode 169

http://www.csoonline.com/article/3110975/techology-business/how-do-you-measure-success-when-it-comes-to-stopping-phishing-attacks.html

http://www.databreachtoday.com/equation-group-hacking-tool-dump-5-lessons-a-9358

http://www.csoonline.com/article/3109982/security/attackers-dont-need-vulnerabilities-when-the-basics-work-just-as-well.html

http://www.securityweek.com/attacker-uses-virtual-machine-hide-malicious-activity

http://www.networkworld.com/article/3110653/security/imperva-application-layer-ddos-attacks-are-on-the-rise.html

http://arstechnica.com/security/2016/08/actively-exploited-ios-flaws-that-hijack-iphones-likely-spread-for-years/

Defensive Security Podcast Episode 167

http://www.csoonline.com/article/3101863/security/report-only-3-percent-of-u-s-companies-pay-attackers-after-ransomware-infections.html

http://www.bankinfosecurity.com/fed-reserve-a-9282

http://www.tripwire.com/state-of-security/featured/does-dropping-malicious-usb-sticks-really-work-yes-worryingly-well/

http://arstechnica.com/security/2016/08/frequent-password-changes-are-the-enemy-of-security-ftc-technologist-says/

http://spectrum.ieee.org/tech-talk/telecom/security/nigerian-scammers-infect-themselves-with-own-malware-revealing-new-wirewire-fraud-scheme

http://www.csoonline.com/article/3106076/data-protection/disable-wpad-now-or-have-your-accounts-and-private-data-compromised.html

http://fortune.com/2016/08/12/delta-airlines-outages/

 

Defensive Security Podcast Episode 142

https://www.fireeye.com/blog/threat-research/2015/12/fin1-targets-boot-record.html

http://www.csoonline.com/article/3012443/security/how-the-nsa-uses-behavior-analytics-to-detect-threats.html#tk.rss_all

http://www.databreachtoday.com/wyndham-agrees-to-settle-ftc-breach-case-a-8737

https://technet.microsoft.com/en-us/library/security/ms15-127.aspx

https://www.reddit.com/r/sysadmin/comments/3wa8rl/early_warning_system_for_cryptowall_crypto_canary/

Defensive Security Podcast Episode 122

http://arstechnica.com/security/2015/07/massive-leak-reveals-hacking-teams-most-private-moments-in-messy-detail/ & http://www.csoonline.com/article/2945200/vulnerabilities/adobe-to-patch-flash-0-day-created-by-hacking-team.html
http://securityaffairs.co/wordpress/38372/cyber-crime/kins-malware-builder-leaked.html
https://threatpost.com/cyber-ul-could-become-reality-under-leadership-of-hacker-mudge/113538
http://www.federaltimes.com/story/government/omr/opm-cyber-report/2015/06/23/keypoint-usis-opm-breach/28977277/

Defensive Security Podcast Episode 120

http://www.bankinfosecurity.com/blogs/did-fisma-facilitate-opm-hack-p-1879/op-1

http://www.csoonline.com/article/2936723/data-breach/user-error-is-an-expected-business-problem.html

http://www.databreachtoday.com/blogs/post-malware-outbreak-rip-replace-p-1877

http://www.csoonline.com/article/2936615/data-breach/6-breaches-lessons-reminders-and-potential-ways-to-prevent-them.html

http://www.nytimes.com/2015/06/17/sports/baseball/st-louis-cardinals-hack-astros-fbi.html

Defensive Security Podcast Episode 118

http://www.symantec.com/connect/fr/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information

https://nakedsecurity.sophos.com/2015/05/21/anatomy-of-a-logjam-another-tls-vulnerability-and-what-to-do-about-it/

http://krebsonsecurity.com/2015/05/carefirst-blue-cross-breach-hits-1-1m/

http://www.forbes.com/sites/thomasbrewster/2015/05/20/guns-bombs-hacking-cars-and-planes-dangerous-tweets-for-a-security-researcher/

Defensive Security Podcast Episode 115

http://www.wsj.com/articles/five-simple-steps-to-protect-corporate-data-1429499477
http://www.politico.com/story/2015/04/sony-hackers-fake-emails-117200.html
http://www.japantimes.co.jp/news/2015/04/21/national/tepcos-frugality-rapped-after-48000-pcs-found-running-windows-xp/
http://www.darkreading.com/attacks-breaches/zero-day-malvertising-attack-went-undetected-for-two-months/d/d-id/1320092
http://www.csoonline.com/article/2913884/access-control/credit-card-terminals-have-used-same-password-since-1990s-claim-researchers.html#tk.rss_all

Defensive Security Podcast Episode 112

 HTCIA conference: http://www.htciaconference.org