threat analysis

  1. News

    TA14-295A: Crypto Ransomware

    Original release date: October 22, 2014 Systems Affected Microsoft Windows Overview Ransomware is a type of malicious software (malware) that infects a computer and restricts access to it until a ransom is paid to unlock it. This Alert is the result of Canadian Cyber Incident Response...
  2. News

    The Next Leap Forward in Cyber Defense: Taking Action to Help Defeat Adversaries

    It is often said that attackers have an advantage, because the defenders have to protect every part of their systems all the time, while the attacker only has to find one way in. This argument oversimplifies the security landscape and the real strength that defenders can achieve if they work...
  3. News

    Microsoft Releases Security Advisory 2953095

    Today we released Security Advisory 2953095 to notify customers of a vulnerability in Microsoft Word. At this time, we are aware of limited, targeted attacks directed at Microsoft Word 2010. An attacker could cause remote code execution if someone was convinced to open a specially crafted Rich...
  4. News

    Microsoft Releases Security Advisory 2934088

    Today, we released Security Advisory 2934088 regarding an issue that impacts Internet Explorer 9 and 10. Internet Explorer 6, 7, 8 and 11 are not affected. At this time, we are only aware of limited, targeted attacks against Internet Explorer 10. This issue allows remote code execution if users...
  5. News

    Microsoft Releases Security Advisory 2896666

    Today we released Security Advisory 2896666 regarding an issue that affects customers using Microsoft Windows Vista and Windows Server 2008, Microsoft Office 2003 through 2010, and all supported versions of Microsoft Lync. We are aware of targeted attacks, largely in the Middle East and South...
  6. News

    Fix it for Security Advisory 2847140 is available

    We have updated Security Advisory 2847140 to include an easy, one-click Fix it to address the known attack vectors. The Fix it is available to all customers and helps prevent known attacks that leverage the vulnerability to execute code and should not affect your ability to browse the Web...
  7. Mike

    Following Spamhaus DDoS Attack, Action Taken. We Seek Your Feedback!

    Hello everyone, Tonight, we implemented CloudFlare, which uses its own content delivery network and content processing. Were the site to go down, content would continue to be available for a number of days, even if our servers that process that data goes down. This is not the first time that we...
  8. News

    Fix it for Security Advisory 2794220 now available

    We have updated Security Advisory 2749920 to include the Fix it we discussed in Saturday’s blog post. This easy, one-click Fix it is Link Removed to everyone and prevents the vulnerability from being used for code execution without affecting your ability to browse the Web. Additionally...
  9. P

    Windows 7 Can virus's inject into legitimate process's ? (One for all you tech wizards out there)

    (This pertains to windows 7) As title really, is it possible for a threat loaded from something like a web page or something else, to inject malicious dll's into existing legitimate windows processes ? And when i say existing processes i mean the processes and type of stuff that most people...
  10. L

    Windows 7 Stealth Mode Detection

    Is it possible to detect if there is a program running on my machine in stealth mode? Specifically if i suspect a keylogger (eg eblaster) has been covertly installed on my machine is there any way to detect this?
Back
Top