Original release date: March 3, 2021
Summary
Cybersecurity and Infrastructure Security (CISA) partners have observed active exploitation of vulnerabilities in Microsoft Exchange Server products. Successful exploitation of these vulnerabilities allows an unauthenticated attacker to execute...
Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the <a href="Techniques - Enterprise | MITRE ATT&CK®">ATT&CK for...
Original release date: October 30, 2020
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques.
This joint cybersecurity advisory...
Original release date: September 1, 2020
Summary
This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia,[Link Removed] Canada,[2] New Zealand,[3][4] the United Kingdom,[5] and the United States.[Link Removed] It...
access control
cybersecurity
data exfiltration
data protection
firewall security
incident management
incident response
indicators of compromise
log management
maliciousactivity
mitigation techniques
monitoring tools
network security
network segmentation
remote access
system administration
threat analysis
user education
user training
vulnerability assessment
Original release date: July 16, 2020
Summary
This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) and Pre-ATT&CK frameworks. See the MITRE ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques.
Attributing...
Original release date: July 1, 2020 | Last revised: July 2, 2020
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques.
This...
Original release date: May 5, 2020
Summary
This is a joint alert from the United States Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC).
CISA and NCSC continue to see indications that...
Original release date: July 1, 2020
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques.
This advisory—written by the...
anonymity
apt
cisa
command and control
cybersecurity
data exfiltration
data manipulation
denial of service
exploitation
fbi
incident response
indicators of compromise
maliciousactivity
network monitoring
network security
reconnaissance
risk mitigation
security tools
threat actors
tor
Original release date: October 03, 2018
Systems Affected
Network Systems
Overview
The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016...
Original release date: October 02, 2018
Systems Affected
Retail Payment Systems
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS), the Department of the Treasury (Treasury), and the Federal Bureau of Investigation...
Hello All,
Greetings!!!
In our environment we monitor windows events 4624 and 4625 on AD for other workstations as all workstations can not integrated in a SIEM.
However, in event 4624 and 4625, we are not getting any type 10 or type 2 logon type that could tell us the interactive logon has...
activity
credentials
detection
event 4624
event 4625
events
guidance
interactive
logon
maliciousactivity
monitoring
policy
security
siem
type 10
type 2
type 3
windows ad
workstation
Original release date: March 15, 2018
Systems Affected
Domain Controllers
File Servers
Email Servers
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert...
Original release date: November 14, 2017
Systems Affected
Network systems
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. government partners, DHS...
Original release date: October 20, 2017
Systems Affected
Domain Controllers
File Servers
Email Servers
Overview
This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert...
Original release date: December 01, 2016
Systems Affected
Microsoft Windows
Overview
“Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes. The United States Department of...
anti-virus
avalanche
botnet
crimeware
cybersecurity
data theft
denial of service
dhs
fast-flux
fbi
financial fraud
maliciousactivity
malware
phishing
ransomware
remediation
security updates
sensitive data
user safety
windows
"From the rise of retro fashion trends, art, music, and literature (as inspired by some great 21st century works of literature like "Pride and Prejudice and Zombies" and the complete stereo remastered works of The Beatles), I explore the notion of a Hacking Renaissance taking place today and...
1990s
anonymous
black hat
computer security
corporate espionage
cultural critique
cybersecurity
digital privacy
ethical hacking
hackers
hacking
information security
internet
lulz security
maliciousactivity
nostalgia
online community
pop culture
society
white hat
Link Removed - Invalid URL
USBDeview - View all installed/connected USB devices on your systemView any installed/connected USB device on your system
Link Removed
The article discusses some of the artifacts that a USB storage device leaves on a system when it has been plugged in, how...
computer forensics
data exfiltration
event timing
forensic examination
guid
historical data
maliciousactivity
malware
network security
ntuser.dat
registry
sensitive information
setupapi.log
storage devices
usb analysis
usb artifacts
usb security
usbdeview
user profiles
windows 7
What is SQL Injection Attacks
With the growing up of B/S model application development, more and more programmer write program with it. Unfortunately, many programmers did not judge the validity of users’ input data during encoding, and then, there will be security risk in...