Go Back > News > RSS Newsfeeds > Categories

User login

Frontpage Sponsor


As a Customer What would do to keep your ERP Implementation intact
Proactively define Business Process-- Take the Project Ownership
Handover everything to System Integrator from drawing BP till implementation of ERP
Hire more inhouse skilled & capable IT Resource to work directly with SI
Rely on SI Architects/Consultants
Total votes: 4

Baanboard at LinkedIn

Reference Content


Automatic Hunting for Malicious Files Crossing your Network, (Thu, Mar 22nd)

SANS Internet Storm Center - March 22, 2018 - 8:21am
If classic security controls remain mandatory (antivirus, IDS, etc), it is always useful to increase your capacity to detect suspicious activities occurring in your networks.
Categories: Security

Surge in blackmailing?, (Wed, Mar 21st)

SANS Internet Storm Center - March 21, 2018 - 7:53am
What’s happening with blackmails? For those who don't know the word, it is a piece of mail sent to a victim to ask money in return for not revealing compromising information about him/her. For a few days, we noticed a peak of such malicious emails. One of our readers reported one during the weekend, Johannes Ullrich received also one. A campaign targeted people in The Netherlands. 
Categories: Security

Administrator's Password Bad Practice, (Tue, Mar 20th)

SANS Internet Storm Center - March 20, 2018 - 5:59pm
Just a quick reminder about some bad practices while handling Windows Administrator credentials. I'm constantly changing my hunting filters on VT. A few days ago, I started to search for files/scripts that use the Microsoft SysInternals tool psexec[1]. For system administrators, this a great tool to execute programs on remote systems but it is also used by attackers to pivot internally. This morning, my filter returned an interesting file with a VT score of 11/66. The file is a compiled AutoIT script. This kind of malicious files is coming back via regular waves[2]. AutoIT executable can be easily decompiled. To achieve this, I'm using Exe2Aut.exe[3]. This tool has not been updated for a while but is still doing a good job.
Categories: Security

Wireshark and USB, (Sat, Mar 17th)

SANS Internet Storm Center - March 17, 2018 - 11:23pm
Wireshark can capture USB traffic, provided you fulfil the necessary requirements.
Categories: Security

[Wireshark-announce] Wireshark 2.5.1 is now available, (Fri, Mar 16th)

SANS Internet Storm Center - March 16, 2018 - 8:29am
Wireshark-announce: [Wireshark-announce] Wireshark 2.5.1 is now available
Categories: Security

VMWARE Security Advisory: VMSA-2018-0008, (Fri, Mar 16th)

SANS Internet Storm Center - March 16, 2018 - 8:29am
VMware has released the following new security advisory:
Categories: Security

Microsoft March 2018 Patch Tuesday, (Tue, Mar 13th)

SANS Internet Storm Center - March 13, 2018 - 7:32pm
March 2018 Security Updates (Preliminary. Work in Progress)
Categories: Security

How did it all start? Early Memcached DDoS Attack Precursors and Ransom Notes, (Tue, Mar 13th)

SANS Internet Storm Center - March 13, 2018 - 2:30pm
This is a guest diary written by Remco Verhoef . Remco is the founder of Dutchsec
Categories: Security

Payload delivery via SMB, (Mon, Mar 12th)

SANS Internet Storm Center - March 12, 2018 - 8:10am
This weekend, while reviewing the collected data for the last days, I found an interesting way to drop a payload to the victim. This is not brand new and the attack surface is (in my humble opinion) very restricted but it may be catastrophic. Let's see why.
Categories: Security

All times are GMT +2. The time now is 21:37.

©2001-2018 - -