The Latest in IT Security

Posts Tagged ‘Forensics’

Year: 2015 Number of customers breached: 2.4 million (90,000 credit card numbers) Brands affected: TalkTalk #mobile, Talk Mobile, OneStopPhoneShop.co.uk, e2save.com #data taken: not credit card numbers but names, addresses, dates of birth Was it sophisticated? The word has become meaningless. All breaches are now described that way Period of breach: around two weeks to 5 […]

Read more ...

Last week, our friends at Sucuri sent us a modified version of an Apache webserver redirecting some of its requests to the infamous Blackhole exploit packs. Sucuri has published a blog post on this attack. Our analysis of this malware, dubbed Linux/Cdorked.A, reveals that it is a sophisticated and stealthy backdoor meant to drive traffic […]

Read more ...

“Customer Feedback” is always important, even when they are victims of state-sponsored attacks Although the Flamer Trojan has “committed suicide” quite a while ago, we continue the malware forensics saga with a new episode. Today, we will be describing a less-documented feature of Flamer called advnetcfg.ocx – a module that acts both as an antivirus […]

Read more ...


Categories

FRIDAY, NOVEMBER 15, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments