Recommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent …
Phishing
-
MonitoringNetwork TrafficPasswordScanningSecuritySoundUS-CertVirtual Private Network (VPN)
Advanced Persistent Threat Activity Exploiting Managed Service Providers
by blackMOREby blackMOREOrganizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s …
-
AMDHackingLinuxMetasploitMonitoringNetwork TrafficPasswordSecurityShell ScriptUS-CertWindowsWireshark
Publicly Available Tools Seen in Cyber Incidents Worldwide
by blackMOREby blackMORERemote Access Trojan: JBiFrost First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A …
-
BrowserDatabaseHackingMonitoringOthersPasswordScanningSecuritySecurity SoftwareSpam
Catching bad guys
by blackMOREby blackMOREEver wondered how the good guys catch bad guys? I meant to say, what’s the process of catching bad guys who create virus, malware, crypto-lockers? It’s sort of a grey …
-
BINDDenial-of-Service Attack (DoS)HackingHow toPythonSecurityVideo
dns2proxy – Offensive DNS server post-explotation tool – DNS spoofing, phishing and pharming
by blackMOREby blackMOREdns2proxy is an offensive DNS server that offers various features for post-exploitation once you’ve changed the DNS server of a victim. This tools offers different features for post-explotation once you …