Emotet continues to be among the most costly and destructive malware affecting SLTT governments. Its worm-like features result in rapidly spreading network-wide infection, which are difficult to combat. Emotet infections …
Security
-
MonitoringNetwork TrafficPasswordSecuritySpamUS-CertWindows
Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
by blackMOREby blackMORERecommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent …
-
Bugs (Software and Hardware)OthersSecurityTechnical Documentation
Check Point SandBlast protected users from a Zero-Day Microsoft Office Vulnerability
by blackMOREby blackMORENeil Armstrong, the great space explorer, once said “research is all about creating new knowledge.” And of course, with knowledge we are in a better position to predict, and thus …
-
DatabaseHackingMetasploitPasswordSecurity
Automated Penetration Testing with APT2 Toolkit
by blackMOREby blackMOREAPT2 is an Automated Penetration Testing Toolkit. This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processesd results will …
-
NewsOthersSecuritySecurity SoftwareSecurity Tools
What are the Challenges of Using Open Source Cybersecurity Tools?
by blackMOREby blackMOREBy making their source code freely available, developers of open source software rely on the power of the wider community in order to help them audit and improve their code. …