threat analysis

  1. AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity

    Original release date: September 1, 2020 Summary This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia,[Link Removed] Canada,[2] New Zealand,[3][4] the United Kingdom,[5] and the United States.[Link Removed] It...
  2. AA20-205A: NSA and CISA Recommend Immediate Actions to Reduce Exposure Across Operational Technologies and Control Systems

    Original release date: July 23, 2020 Summary Note: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise and Link Removed frameworks for all referenced threat actor techniques and mitigations. Over recent...
  3. Windows 10 Recently removed a trojan from win10

    i recently found out that my laptop has a trojan , which came with a software i install 6 to 7 days ago . windows defender found out it but was unable to remove it.Every time it reboot it came back.I checked in task manager for startup program , there was a strang prgm csrss.exe. So. it was a...
  4. C

    Windows 10 What are the best Windows artefacts to look for a system hack?

    Hi I am an aspiring computer security investigator, I am currently creating a security respondent plan for a hacked Windows 10 machine. I’m using forensic autopsy software for testing purposes. I have no idea what the hack is yet, I’ve just been told to think of possible scenarios of where to...
  5. Windows 10 Bogus Emails, what?

    Hi Both my wife and I are getting bogus emails from people we know that we know they aren't sending intentionally. What these messages have in common is the code goo.gl/ I kind of understand that this is a signal to shorten the visible address. The messages have no subject, have a message...
  6. TA18-201A: Emotet Malware

    Original release date: July 20, 2018 Systems Affected Network Systems Overview Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state...
  7. TA14-295A: Crypto Ransomware

    Original release date: October 22, 2014 Systems Affected Microsoft Windows Overview Ransomware is a type of malicious software (malware) that infects a computer and restricts access to it until a ransom is paid to unlock it. This Alert is the result of Canadian Cyber Incident Response...
  8. P

    Windows 7 Can virus's inject into legitimate process's ? (One for all you tech wizards out there)

    (This pertains to windows 7) As title really, is it possible for a threat loaded from something like a web page or something else, to inject malicious dll's into existing legitimate windows processes ? And when i say existing processes i mean the processes and type of stuff that most people...
  9. Panda Security hacked by Antisec !

    The message left on the first page hello friends! pandasecurity.com, better known for its shitty ANTIVIRUS WE HAVE BACKDOORED, has earning money working with Law Enforcement to lurk and snitch on anonymous activists. they helped to jail 25 anonymous in different countries and they were actively...
  10. L

    Windows 7 Stealth Mode Detection

    Is it possible to detect if there is a program running on my machine in stealth mode? Specifically if i suspect a keylogger (eg eblaster) has been covertly installed on my machine is there any way to detect this?