Search Results

Search results for "backdoor"

Daserf – A Backdoor to Espionage | AT&T Cybersecurity

https://www.alienvault.com/blogs/security-essentials/daserf-a-a-backdoor-to-espionage

Daserf is an example of a backdoor, malware that provides attackers with access to the compromised system. It’s commonly used for data theft, as you can see from the number of AlienVault blog posts that include the term. The Daserf malware has been around for about 10 years, created by a low ...

Governments and Backdoors | AT&T Cybersecurity

https://www.alienvault.com/blogs/security-essentials/governments-and-backdoors

Should governments be given backdoors to technology products? British PM Theresa May has been waging a long battle against encryption, stating that end-to-end encryption in apps like WhatsApp is “completely unacceptable” and that it provides a safe haven for terrorists. The argument crops up ...

Common Types of Malware, 2016 Update | AT&T Cybersecurity

https://www.alienvault.com/blogs/security-essentials/common-types-of-malware-2016-update

With October being Cyber Security Awareness Month, we thought we’d talk about common types of malware, and let you know about some emerging threats in the security landscape. We continuously strive to 'arm' our readers with the latest information about new attack methods and techniques so that ...

The Felismus RAT: Powerful Threat, Mysterious Purpose

https://www.alienvault.com/.../the-felismus-rat-powerful-threat-mysterious-purpose

This week, my colleagues and I furiously investigated the mystery of Felismus, a sophisticated, well-written piece of malware discovered recently by researchers at Forcepoint Labs. The malware’s modular, self-updating construction is a nod to the apparent skill of its creators and the severe risk ...

Chapter 2: Building a SOC: Processes and Procedures

https://www.alienvault.com/resource-center/ebook/building-a-soc/soc-processes

Tier 1 SOC Analysts review the latest events that have the highest criticality or severity. Once they’ve verified that these events require further investigation, they’ll escalate the issue to a Tier 2 Security Analyst (please note: for smaller teams, it may be that the same analyst will investigate issues as they escalate into a deeper investigation).

2019 Sharepoint Vulnerability & CVE-2019-0604 Exploit ...

https://www.alienvault.com/blogs/labs-research/sharepoint-vulnerability-exploited-in...

AT&T Alien Labs has seen a number of reports of active exploitation of a vulnerability in Microsoft Sharepoint (CVE-2019-0604). One report by the Saudi Cyber Security Centre appears to be primarily targeted at organisations within the kingdom. An earlier report by the Canadian Cyber Security Centre ...

Newly Discovered Iranian APT Group Brings State-sponsored ...

https://www.alienvault.com/blogs/security-essentials/newly-discovered-iranian-apt...

State-sponsored cyber espionage has been rising steadily in recent years. Whether it’s high-profile attacks such as North Korea’s hack of Sony in 2014, China’s alleged hack of the US’s Office of Personnel Management in 2015, or Russia’s alleged hack of the Democratic National Committee in ...

Patrick Bedwell's profile | AT&T Cybersecurity

https://www.alienvault.com/blogs/author/pbedwell

Patrick Bedwell VP, Product Marketing. Patrick has been working in information security for over 17 years, creating and executing marketing strategies for both startups and public companies.

Security Operations Center (SOC) Software | AlienVault

https://www.alienvault.com/solutions/security-operations-center

The purpose of a Security Operations Center (SOC) is to identify, investigate, prioritize, and resolve issues that could affect the security of an organization’s critical infrastructure and data. A well-developed and well-run SOC can perform real-time threat detection and incident response, with ...

AlienVault is Now AT&T Cybersecurity

https://www.alienvault.com

At AT&T Cybersecurity our mission is to provide phenomenal threat intelligence, collaborative defense & effective security for organizations of all sizes.

1 2 3 4 5 6 7 8 9 10
Watch a Demo ›
Get Price Free Trial