One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 519344
Date de publication 2018-03-16 13:00:00 (vue: 2018-03-16 13:00:00)
Titre Things I hearted this week 16th March 2018
Texte Last weekend, my daughter and I finally got around to watching Wonder Woman. We quite enjoyed it. There was a part in which Chris Pine’s character said, “My father told me once, he said, "If you see something wrong happening in the world, you can either do nothing, or you can do something". And I already tried nothing." So, I turned to my daughter and asked, "When you're older will you say awesome quotes and attribute them to your dad so I'll appear all knowing and wise?" She replied, "Yeah, I'll say 'my father told me if you see something wrong you can either do nothing, or send memes'". Not sure if that means I’ve succeeded as a Dad or failed miserably. Hopefully she’ll come across one of these posts in the future and realise there was more to me than just memes. Operation Bayonet This article gives a fascinating insight into how law enforcement infiltrated and took down a drug market. As reports of these kinds of operations become available, Hollywood should really be looking to these for inspiration. Far better plots than most fiction! Operation Bayonet: Inside the sting that hijacked an entire dark web drug market | Wired How many devices are misconfigured… or not configured? I saw this blog that Anton Chuvakin posted over at Gartner stating that there’s a lot of security technology which is deployed yet misconfigured, not configured optimally, set to default, or deployed broken in other ways. Broadly speaking, I agree, in the race to get things done, assurance often takes a back seat. But there’s no obvious answer. Testing takes time and expertise. Unless it’s automated. But even then someone needs to look at the results and get things fixed. DevSecOps maybe? How Much of Your Security Gear Is Misconfigured or Not Configured? | Gartner Hacking encrypted phones Encrypted phone company Ciphr claims it was hacked by a rival company. A preview into how vicious digital rivals can get. And regardless of who is to blame, the fact remains that the real victims here are the users. Customer Data From Encrypted Phone Company Ciphr Has Been Dumped Online | Motherboard Hidden Cobra on Turkish Banks Bankshot implants are distributed from a domain with a name similar to that of the cryptocurrency-lending platform Falcon Coin, but the similarly named domain is not associated with the legitimate entity. The malicious domain falcancoin.io was created December 27, 2017, and was updated on February 19, only a few days before the implants began to appear. These implants are variations of earlier forms of Bankshot, a remote access tool that gives an attacker full capability on a victim’s system. This implant also contains functionality to wipe files and content from the targeted system to erase evidence or perform other destructive actions. Bankshot was first reported by the Department of Homeland Security on December 13, 2017, and has only recently resurfaced in newly compiled variants. The sample we analyzed is 99% similar to the documented Bankshot variants from 2017.
Envoyé Oui
Condensat #mildshock” 'my “as “company “corporate “my ‘2 16th 2017 2018 about access across actions adversary after against agree all alleged along already also analyzed answer anti anton appear are around arrives article asked aspects associated assurance atlanta attacker attribute authentication automated available aware away awesome back banks bankshot based bayonet bayonet: become been before began benefit best betray better blame blockchain blog bloomberg border bradfield breach broadly broken brussels but can cannot capability cash character charged chris chuvakin cio ciphr claims cobra coin come commission commonly company compiled complaint complex conclude concluded confidential configured consuming contains content created creating credentials cross cryptocurrency customer cyber dad dark data daughter days december default defences department deployed destination destructive detection development devices devsecops digital director distributed documented does domain done down drug dumped earlier edr effort either encrypted endpoint enforcement engagements enjoyed ensure entire entity equifax erase evading even evidence exchange executive expertise expose extremely fact factor failed falcancoin falcon far fascinating fast father february fiction files final finally financial find first fixed flash focused foothold former forms framework from full functionality further future gartner gear generation get gets getting gives got great hacked hacking had half handles happening happens has have hearted here hidden high hijacked his hollywood homeland hopefully house how i'll i’ve implant implants including infiltrated information inside insider insiders insight inspiration intrusions ioc’s is: isn’t it’s its john just keeping kept kinds knowing korea last law learn leaves led legitimate lending life login logins look looking lot machine mainstream make makes malicious many march market massive material maybe mcafee mdsec means memes memes' memory messaging misconfigured misconfigured… miserably money more most motherboard moved much mused name named naturally needed needs new newly news north not nothing number obsolete obvious office often older once one online only operation operations opted optimally order other otx over own part password payload payloads payments perform phone phones pine’s place platform playing plots posted posts powershell preview private progress public put quite quotes race ready real realise really recently regardless regional release remains remote replied reported reports research response results resurfaced richard riley rival rivals said sample sandboxing saw say says seat sec sec’s secret sector securities security see send set shareholders sharpshooter she she’ll short should similar similarly simplified simulation situation slow sold solutions someone something sonic speaking spent stating sting stock strap strapped succeeded success such suffered summed sure swift system systems take takes targeted targets techniques technology techrepublic test testing than them then there’s these things through time times together’ token told took tool topic tour trading transfers travels trials tribulations tried turkish turned twitter two typically unless updated use used username users using value variants variations various versions/architectures vibration vicious victim’s victims virus watching way ways we’ve web week weekend well went what when where which who will wipe wired wise woman wonder world would wrong yeah yet ying you're your
Tags Medical
Stories Equifax APT 38
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: