Cyber Threat Intelligence

Icon

Just another WordPress.com site

Infosecurity – Shining a light on zero-day attacks

Infosecurity – Shining a light on zero-day attacks: “”

(Via .)

Filed under: Uncategorized,

Complaint Alleges Contractor Sabotaged Network and Stole Data (August 30, 2012) | National Cyber Security

Complaint Alleges Contractor Sabotaged Network and Stole Data (August 30, 2012) | National Cyber Security: ”

Complaint Alleges Contractor Sabotaged Network and Stole Data (August 30, 2012)
| August 31, 2012
A civil complaint filed by Toyota in US District Court in Kentucky alleges that a former employee sabotaged applications on the Toyota network and stole data after he was fired…….

Filed under: Uncategorized,

Researchers find critical vulnerability in Java 7 patch hours after release – Computerworld

Researchers find critical vulnerability in Java 7 patch hours after release – Computerworld: “Skip the navigation

Researchers find critical vulnerability in Java 7 patch hours after release
The new vulnerability allows a complete Java Virtual Machine sandbox escape in Java 7 Update 7, researchers from Security Explorations say

By Lucian Constantin
August 31, 2012 12:08 PM ET4 Comments .
IDG News Service – Security researchers from Poland-based security firm Security Explorations claim to have discovered a vulnerability in the Java 7 security update released Thursday that can be exploited to escape the Java sandbox and execute arbitrary code on the underlying system.

Security Explorations “

(Via .)

Filed under: Uncategorized

Cuckoo: Increasing the Power of Malware Behavior Reporting With Signatures | /dev/random

Cuckoo: Increasing the Power of Malware Behavior Reporting With Signatures | /dev/random: “/DEV/RANDOM Can’t sleep, hackers will eat me! About Me About Me PGP Public Key DisclaimerTools twittermon pastemon hoover alerts2afterglow rrhunter ossec2dshield ossec_dashboard known_hosts_bruteforcer syslog2loggly InfoSec Calendar

Cuckoo: Increasing the Power of Malware Behavior Reporting With Signatures

July 27, 2012 Cuckoo, Malware, Security, Software, 0 The new version (0.4) of Cuckoo, the open source  malware analysis system has been released this week. That’s a great news! The list of changes and new features is very impressive. So big that an upgrade is not recommended. In my case, I just installed a brand new Cuckoo instance. It was much easier and save me some nightmares. I still need to upgrade the instance running on my Macbook pro, I hope it will run also very smoothly. Some of the most significant changes are:

Brand new  base code Support for KVM Support for YARA & VirusTotal New post-analysis modules Behavioral signatures The last feature is really what I was expectin”

(Via.)

Filed under: Uncategorized,

#TheWikiBoat and #SabuSec leak Productsummary.ws accounts on Pastebin | Cyberwarzone

#TheWikiBoat and #SabuSec leak Productsummary.ws accounts on Pastebin | Cyberwarzone: “”

(Via.)

Filed under: Uncategorized, ,

Hacker group breaks into Apple supplier Foxconn

Hacker group breaks into Apple supplier Foxconn | TheCybersaviours: “”

(Via .)

Filed under: Uncategorized, ,

United Nations website gets hacked

United Nations website gets hacked | TheCybersaviours: “”

(Via .)

Filed under: Uncategorized,

KPN – Dutch Telecommunications company hack

ISC Diary | KPN (Dutch Telecommunications company) Hack: “”

(Via .)

Filed under: Uncategorized,

Welcome to the Cyber Threat Intelligence Blog

Welcome to the Cyber Threat Intelligence blog.  Here you will find cross-industry articles that are interesting to cyber security researchers.

Filed under: Uncategorized