Search Results

Search results for "backdoor"

Correlation Rules - AlienVault

https://www.alienvault.com/.../user-guide/rules-management/correlation-rules.htm

Threat Categories on Correlation Rules; intent Description; System Compromise State or indication that an intruder has bypassed security measures and gained unauthorized access to resources, installed malicious software, or modified existing software or configurations in an attempt to cause damage or steal information.: Behavior indicating a compromised system.

Security Myths : TweetChat Roundup | AT&T Cybersecurity

https://www.alienvault.com/blogs/security-essentials/security-myths-tweetchat-roundup

It would appear as if there are more myths and misconceptions in information security than there are truths. Although, that being said, there were a lot of common themes that most participants agreed upon, so maybe it’s a case of fixing a few issues to have a broad impact. Let us know if you have ...

2019 Sharepoint Vulnerability & CVE-2019-0604 Exploit ...

https://www.alienvault.com/blogs/labs-research/sharepoint-vulnerability-exploited-in...

AT&T Alien Labs has seen a number of reports of active exploitation of a vulnerability in Microsoft Sharepoint (CVE-2019-0604). One report by the Saudi Cyber Security Centre appears to be primarily targeted at organisations within the kingdom. An earlier report by the Canadian Cyber Security Centre ...

The REAL 2019 Cyber Security Predictions | AT&T Cybersecurity

https://www.alienvault.com/blogs/security-essentials/the-real-2019-cyber-security...

It’s December, which means it’s time to get those 2019 cyber predictions going. While there are many well-informed, and some not-so-well informed opinions out there, I’ve dug through the cyber underground, I’ve climbed data mountains, and delved to the depths of the dark web to seek out what is really happening.

ZombieBoy | AT&T Alien Labs

https://www.alienvault.com/blogs/labs-research/zombieboy

This is a guest post by independent security researcher James Quinn. Continuing the 2018 trend of cryptomining malware, I’ve found another family of mining malware similar to the “massminer” discovered in early May.

The Felismus RAT: Powerful Threat, Mysterious Purpose | AT ...

https://www.alienvault.com/.../the-felismus-rat-powerful-threat-mysterious-purpose

This week, my colleagues and I furiously investigated the mystery of Felismus, a sophisticated, well-written piece of malware discovered recently by researchers at Forcepoint Labs. The malware’s modular, self-updating construction is a nod to the apparent skill of its creators and the severe risk ...

FF-RAT Uses Stealth Tactics to Evade Endpoint Detection ...

https://www.alienvault.com/.../ff-rat-uses-stealth-tactics-to-evade-endpoint-detection

Twice this year (April and June 2015), the United States Office of Personnel Management (OPM) fell victim to a series of targeted attacks that resulted in 21 million current and former Federal government employees’ information being stolen. In the months following the breaches, the FBI’s Cyber ...

Week in Review, 25th August 2017 | AT&T Cybersecurity

https://www.alienvault.com/blogs/security-essentials/week-in-review-25th-august-2017

About the Author: Javvad Malik The man, the myth, the blogger; Javvad Malik is a London-based IT Security professional. Better known as an active blogger, event speaker and industry commentator who is possibly best known as one of the industry’s most prolific video bloggers with his signature fresh and light-hearted perspective on security.

Elise Malware from Operation Lotus Blossom | AT&T ...

https://www.alienvault.com/.../elise-malware-from-operation-lotus-blossom

Devotion to the mystic law of hack and defend... We keep seeing these Advanced Persistent Threat (APT) type attacks crop up throughout the world. One of the main differentiating factors in these attacks vs ‘common’ ones are the resources at their disposal: time, money, and, most importantly, the ...

End of Summer InfoSec Reading List for 2016 | AT&T ...

https://www.alienvault.com/.../end-of-summer-infosec-reading-list-for-2016

I have a serious thirst for InfoSec knowledge. However, like anybody else in this field, I tend to stay within the domains that interest me most - or that I find myself working in most often. After a recent conversation with a friend I found myself deep-diving into a whitepaper on Apple iOS Security ...

1 2 3 4 5 6 7 8 9 10
Watch a Demo ›
Get Price Free Trial