threat detection

  1. ChatGPT

    Vectra AI Enhances Cybersecurity with 40 New Azure Detections

    In a bold move to bolster cybersecurity amidst soaring threats, Vectra AI has rolled out an enhanced platform featuring over 40 new behavior detections specifically tailored for Microsoft Azure. This update comes at a critical juncture, with the latest Microsoft Digital Defense Report revealing...
  2. ChatGPT

    Revolutionary Windows Server Security Upgrade: Key Features and Implications

    Windows Server's Major Security Upgrade: A Game Changer in Cyber Defense In an age where cyber threats loom larger than ever, the announcement of a significant security enhancement for Windows Server stands as a beacon of hope for IT administrators and businesses worldwide. Last week, Hari...
  3. ChatGPT

    Active Directory Security: CISA's Guide to Detection and Mitigation

    On September 26, 2024, a coalition of cybersecurity authorities, including the Australian Signals Directorate’s Australian Cyber Security Centre (ASD ACSC) and the Cybersecurity and Infrastructure Security Agency (CISA), released a crucial guide titled "Detecting and Mitigating Active Directory...
  4. Joe27

    How to complete remediation

    Remediation Incomplete. I got a notification from Windows Defender that a Trojan had been detected on my laptop, but “Remediation was Incomplete” and the threat remained “Severe”. How do I complete remediation please? So far I have tried: 1. A Windows Defender Quick Scan – nothing detected; 2...
  5. News

    AA21-291A: BlackMatter Ransomware

    Original release date: October 18, 2021 Summary Actions You Can Take Now to Protect Against BlackMatter Ransomware • Implement and enforce backup and restoration policies and procedures. • Use Link Removed. • Use Link Removed. • Implement network segmentation and traversal monitoring. Note...
  6. News

    VIDEO AA21-077A: Detecting Post-Compromise Threat Activity Using the CHIRP IOC Detection Tool

    Original release date: March 18, 2021 Summary This Alert announces the CISA Hunt and Incident Response Program (CHIRP) tool. CHIRP is a forensics collection tool that CISA developed to help network defenders find indicators of compromise (IOCs) associated with activity detailed in the following...
  7. News

    AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

    Original release date: January 8, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This Alert is a companion alert to Link Removed...
  8. News

    AA20-352A: Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations

    Original release date: December 17, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 8 framework. See the ATT&CK for Enterprise version 8 for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure...
  9. R

    Conteban Trojan

    Hi, I recently have been getting a warning of conteban trojan from windows security. It says the threat is severe. So I click remove. Everything seems ok then I edit word doc which is kept on an extrernal portable drive and try to attach it to an email and I get the Arno g again that the...
  10. News

    AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector

    Original release date: October 28, 2020 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity advisory...
  11. News

    AA20-266A: LokiBot Malware

    Original release date: September 22, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques. This product was written by the Cybersecurity and...
  12. News

    AA20-239A: FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks

    Original release date: August 26, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This joint advisory is the result of analytic efforts among...
  13. News

    AA20-227A: Phishing Emails Used to Deploy KONNI Malware

    Original release date: August 14, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. The Cybersecurity and Infrastructure Security Agency (CISA)...
  14. News

    AA20-182A: EINSTEIN Data Trends – 30-day Lookback

    Original release date: June 30, 2020 Summary Cybersecurity and Infrastructure Security Agency (CISA) analysts have compiled the top detection signatures that have been the most active over the month of May in our national Intrusion Detection System (IDS), known as EINSTEIN. This information is...
  15. P

    Windows 10 Avoid auto-deletion of suspicious files (threat) by Defender?

    Assume I extract a *.zip file. One of the files inside contain suspicious code. At least Windows Defender tells me that a Threat has been found AND Defender AUOTMATICALLY deletes this file. Thank you for the information about the (possible) threat. But I don't want a deletion! How can I tell...
  16. News

    AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

    Original release date: October 11, 2018 Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed In it we highlight the use of five...
  17. News

    TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers

    Original release date: October 3, 2018 Systems Affected Network Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016...
  18. News

    Microsoft’s Cyber Defense Operations Center shares best practices

    Today, a single breach, physical or virtual, can cause millions of dollars of damage to an organization and potentially billions in financial losses to the global economy. Each week seems to bring a new disclosure of a cybersecurity breach somewhere in the world. As we look at the current state...
  19. brkkab

    Windows 10 Stay away from S5Mark VPN it's a rootkit really

    PC World just posted a article where Bitdefender found S5Mark VPN to actually be a rootkit and not a VPN. Article link : S5Mark is a 'VPN' that is actually a rootkit in disguise, BitDefender says
  20. MikeHawthorne

    Windows 10 My First Malware in Years...

    Hi Today Windows Defender came up with Malware for the first time ever! It found "Trojan:Win32/peals.flcl" When I looked at the location it said it was in a file called Desktop Lara that's been on my computer for years. If offered to remove it so I did. I then ran Malwarebytes and...
Back
Top