You might be interested in …

[ZDNet] Ransomware: Looking for weaknesses in your own network is key to stopping attacks

All posts, ZDNet

Ransomware criminals look for easy targets – knowing what could be vulnerable on your network can help stop attacks. Source: Read More (Latest topics for ZDNet in Security)

Read More

[SANS ISC] TShark & jq, (Sat, Jan 8th)

All posts, Sans-ISC

TShark (Wireshark’s command-line version) can output JSON data, as shown in diary entry “Quicktip: TShark’s Options -e and -T“. jq is a JSON processor, that I’ve shown before in diary entries like “Retrieving and processing JSON data (BTC example)“. In this diary entry, I will show how to use tshark and jq to produce a […]

Read More

Daily NCSC-FI news followup 2020-02-29

TRICKBOT DELIVERY METHOD GETS A NEW UPGRADE FOCUSING ON WINDOWS 10 blog.morphisec.com/trickbot-delivery-method-gets-a-new-upgrade-focusing-on-windows Over the past few weeks, Morphisec Labs researchers identified a couple dozen documents that execute the OSTAP javascript downloader.. This time we have identified the use of the latest version of the remote desktop activeX control class that was introduced for Windows 10. […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.