Go Back > News > RSS Newsfeeds > Sources

User login

Frontpage Sponsor


Google search

For ERP LN feature pack upgrade, what method of install are you using?
Installation Wizard into existing VRC
Installation Wizard into new VRC
Manual into existing VRC
Manual into new VRC
Total votes: 39

Baanboard at LinkedIn

Reference Content

SANS Internet Storm Center
Syndicate content SANS Internet Storm Center, InfoCON: green
SANS Internet Storm Center - Cooperative Cyber Security Monitor
Updated: 1 hour 21 min ago

Extending Hunting Capabilities in Your Network, (Fri, Mar 23rd)

7 hours 5 min ago
Today's diary is an extension to the one I posted yesterday about hunting for malicious files crossing your network[1]. Searching for new IOCs is nice but there are risks of missing important pieces of information! Indeed, the first recipe could miss some malicious files in the following scenarios:
Categories: Security

Automatic Hunting for Malicious Files Crossing your Network, (Thu, Mar 22nd)

March 22, 2018 - 8:21am
If classic security controls remain mandatory (antivirus, IDS, etc), it is always useful to increase your capacity to detect suspicious activities occurring in your networks.
Categories: Security

Surge in blackmailing?, (Wed, Mar 21st)

March 21, 2018 - 7:53am
What’s happening with blackmails? For those who don't know the word, it is a piece of mail sent to a victim to ask money in return for not revealing compromising information about him/her. For a few days, we noticed a peak of such malicious emails. One of our readers reported one during the weekend, Johannes Ullrich received also one. A campaign targeted people in The Netherlands. 
Categories: Security

Administrator's Password Bad Practice, (Tue, Mar 20th)

March 20, 2018 - 5:59pm
Just a quick reminder about some bad practices while handling Windows Administrator credentials. I'm constantly changing my hunting filters on VT. A few days ago, I started to search for files/scripts that use the Microsoft SysInternals tool psexec[1]. For system administrators, this a great tool to execute programs on remote systems but it is also used by attackers to pivot internally. This morning, my filter returned an interesting file with a VT score of 11/66. The file is a compiled AutoIT script. This kind of malicious files is coming back via regular waves[2]. AutoIT executable can be easily decompiled. To achieve this, I'm using Exe2Aut.exe[3]. This tool has not been updated for a while but is still doing a good job.
Categories: Security

Wireshark and USB, (Sat, Mar 17th)

March 17, 2018 - 11:23pm
Wireshark can capture USB traffic, provided you fulfil the necessary requirements.
Categories: Security

[Wireshark-announce] Wireshark 2.5.1 is now available, (Fri, Mar 16th)

March 16, 2018 - 8:29am
Wireshark-announce: [Wireshark-announce] Wireshark 2.5.1 is now available
Categories: Security

VMWARE Security Advisory: VMSA-2018-0008, (Fri, Mar 16th)

March 16, 2018 - 8:29am
VMware has released the following new security advisory:
Categories: Security

SPECTRE and Meltdown To patch or not to patch?..and HOW (Guest Diary), (Thu, Mar 15th)

March 15, 2018 - 4:58am
This is a guest diary by Joshua Barton
Categories: Security

Malspam pushing Sigma ransomware, (Wed, Mar 14th)

March 14, 2018 - 1:20pm
Categories: Security

Microsoft March 2018 Patch Tuesday, (Tue, Mar 13th)

March 13, 2018 - 7:32pm
March 2018 Security Updates (Preliminary. Work in Progress)
Categories: Security

How did it all start? Early Memcached DDoS Attack Precursors and Ransom Notes, (Tue, Mar 13th)

March 13, 2018 - 2:30pm
This is a guest diary written by Remco Verhoef . Remco is the founder of Dutchsec
Categories: Security

All times are GMT +2. The time now is 16:36.

©2001-2017 - -