The Active Adversary Playbook 2022
Credit to Author: Tilly Travers| Date: Tue, 07 Jun 2022 11:02:43 +0000
Cyberattacker behaviors, tactics and tools seen on the frontline of incident response during 2021
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Tilly Travers| Date: Tue, 07 Jun 2022 11:02:43 +0000
Cyberattacker behaviors, tactics and tools seen on the frontline of incident response during 2021
Read MoreCredit to Author: Christine Barrett| Date: Tue, 03 May 2022 16:00:00 +0000
Learn how D3 Security and Microsoft help customers overcome common security operations center pain points with D3 XGEN SOAR and Microsoft Sentinel.
The post Automating your Microsoft security suite with D3 XGEN SOAR appeared first on Microsoft Security Blog.
Read MoreCredit to Author: Andrew Brandt| Date: Tue, 12 Apr 2022 11:30:45 +0000
Threat actors spent more than five months remotely googling for tools from the target’s machines
Read MoreCredit to Author: Christine Barrett| Date: Mon, 04 Apr 2022 17:00:00 +0000
The importance of assessing and supporting the human aspect of recovery based on our experiences of recovering organizations.
The post Microsoft CRSP shares the ways human behavior affects compromise recovery appeared first on Microsoft Security Blog.
Read MoreCredit to Author: gallagherseanm| Date: Thu, 31 Mar 2022 00:28:07 +0000
SophosLabs IPS signature available to detect and block issue under exploit
Read MoreCredit to Author: Vikas Singh| Date: Tue, 29 Mar 2022 18:27:50 +0000
On the trail of malicious PowerShell artifacts too large to be contained in a single log? Help is on the way.
Read MoreCredit to Author: Chester Wisniewski| Date: Tue, 22 Mar 2022 15:44:34 +0000
The U.S. President releases a statement that Russia’s cyber focus may be shifting towards cyber-offensive action against Western organizations and infrastructure
Read MoreCredit to Author: Chester Wisniewski| Date: Mon, 21 Mar 2022 08:15:48 +0000
The Russian war against Ukraine began on February 24, 2022. This article tracks some of the related cyberattack developments as they unfold. The article is updated regularly and the most recent update was on March 18
Read More