Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2021-01-07 09:00:00 |
(Déjà vu) Dissecting the SolarWinds hack without the use of signatures (lien direct) |
This blog explains how activity related to the SolarWinds hack can be detected without the use of signatures, and why a self-learning approach is the best possible mechanism to catch this Advanced Persistent Threat. |
Hack
|
|
|
|
2021-01-07 09:00:00 |
Detecting the SolarWinds hack without the use of signatures (lien direct) |
This blog explains how activity related to the SolarWinds hack can be detected without the use of signatures, and why a self-learning approach is the best possible mechanism to catch this Advanced Persistent Threat. |
Hack
|
|
|
|
2020-08-05 09:00:00 |
What the Twitter hack reveals about spear phishing – and how to prevent it (lien direct) |
Twitter has now confirmed spear phishing was the cause of last month's attack. This blog looks at the limitations in our current defenses against this well-known attack technique, and how a layered AI approach identifies and stops it. |
Hack
|
|
|