[BleepingComputer] Ransomware victim shows why transparency in attacks matters

As devastating ransomware attacks continue to have far-reaching consequences, companies still try to hide the attacks rather than be transparent. Below we highlight a company’s response to an attack that should be used as a model for all future disclosures. […]

Source: Read More (BleepingComputer)

You might be interested in …

Daily NCSC-FI news followup 2020-06-03

Critical SAP ASE Flaws Allow Complete Control of Databases threatpost.com/critical-sap-ase-flaws-complete-control-databases/156239/ If exploited, the most severe flaws could give unprivileged users complete control of databases and in some cases even underlying operating systems – The most severe vulnerability, CVE-2020-6248, has a CVSS score of 9.1 out of 10. See also: wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222. And also: www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/system-takeover-through-new-sap-ase-vulnerabilities/ Vulnerability Spotlight: […]

Read More

[SANS ISC] Video: CyberChef BASE85 Decoding, (Sun, Jul 18th)

All posts, Sans-ISC

In this video, I show how to decode the sample of Xavier’s diary entry “Multiple BaseXX Obfuscations” with CyberChef. The CyberChef recipe I created can be found here on pastebin.   Didier Stevens Senior handler Microsoft MVP blog.DidierStevens.com (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Source: Read More (SANS […]

Read More

[ZDNet] Security updates released for Adobe Reader after vulnerability ‘exploited in the wild’

All posts, ZDNet

Adobe said attackers have targeted Adobe Reader users on Windows. Source: Read More (Latest topics for ZDNet in Security)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.