One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 284657
Date de publication 2017-01-03 14:00:00 (vue: 2017-01-03 14:00:00)
Titre Top 12 AlienVault Blogs of 2016
Texte Wow, 2016 was quite a year, which provided the AlienVault team and our guest bloggers with plenty of topics to blog on from InfoSec best practices to OceanLotus to Reverse Engineering to building a home malware lab! We are looking forward to providing more educational and useful blogs in 2017. As in 2016, we welcome and support guest bloggers who have contributions to make to the Infosec community. If you are interested in being a guest blogger, please contact me at kbrew@alienvault.com. Lastly, please subscribe to our blog to ensure you get all the new goodies either daily or a weekly summary in your inbox. With our further ado, following are the top 12 AlienVault blogs of 2016: Building a Home Lab to Become a Malware Hunter - A Beginner’s Guide - The top blog of 2016 was written by @sudosev and explains how he set up his own home malware lab. How Penetration Testers Use Google Hacking - Jayme Hancock describes how to do Google hacking / dorking cleverly as a pen tester. It even includes a helpful "cheat sheet". Security Issues of WiFi - How it Works - Everyone loves WiFi, but Joe Gray explains how WiFi works and describes the many security issues and nuances associated with WiFi. Reverse Engineering Malware - In this blog, I interview some members of our AlienVault Labs team to learn how they reverse engineer malware when they're doing security research. The team describes several approaches and tools to use in analyzing malware samples. The Mirai Botnet, Tip of the IoT Iceberg - Javvad Malik talks about IoT security challenges in general, and focuses on the Mirai botnet which focused on XiongMai Technologies IoT equipment in a recent attack. Web Application Security: Methods and Best Practices - The OWASP top 10 and web application security testing are covered in this educational blog by Garrett Gross. Common Types of Malware, 2016 Update - Lauren Barraco outlines the different categories of malware and highlights What's New in 2016. PowerWare or PoshCoder? Comparison and Decryption - Peter Ewane of the Labs team talks about his research into PowerShell vulnerabilities and exploits. He focuses on PowerWare, whick seems to be heavily based on PoshCoder. Can You Explain Encryption to Me? - In this blog by Javvad Malik, he describes encryption to his boss in a hilarious exchange of notes. Javvad then outlines the basics of encryption in a very understandable way. OceanLotus for OS X – an Application Bundl
Notes
Envoyé Oui
Condensat      related 2016 2016: 2017 @sudosev about actor actors ado adobe advice alienvault all analysis analyzing another application approaches are associated attack attacks barraco based basics become beginner’s behind being best blasco blockbuste blockbuster blog blogger bloggers blogs boss botnet building bundle but called can categories challenges cheat cleverly cloud coalition com common community companies comparison contact contributions coordinated covered created daily decryption describes detection different disrupt doing don't dorking eddie educational effort either email encryption engineer engineering ensure equipment even everyone ewane exchange explain explains exploits familiar flash focused focuses following forget forward from further garrett general get goodies google gray great gross group guest guide hacking had hancock have head heavily helpful highlights hilarious his home how hunter hype iceberg ids/ips inbox includes industry information infosec infrastructure initiative interested interview intrusion involving iot issues ithybrid jaime javvad jayme joe kbrew@alienvault lab labs lastly lauren lazarus learn led lee look looking loves make malik malware many members methods mirai more named new notes novetta now nuances oceanlotus one: operation other outlines owasp own part pen penetration peter phishing please plenty poshcoder potentially powershell powerware practices pretending prevention provided providing quite recent research reverse samples security security: seems set several share sheet some sony spoofed stop storiespractical strategies  subscribe summary support talks team techniques: technologies territoryransomware: tester testers testing then they're threats tip tools top topics types understandable unfamiliar unveils update use useful very vulnerabilities way web weekly welcome what's when which whick who wifi works wow written xiongmai year your
Tags Medical
Stories APT 38 APT 32
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: