Category Archives: security

Threat Intel Program – Quick Reference

Cyber Attack Taxonomy Threat Intel Taxonomy Threat Intel Classification Strategic Operational Tactical The decision by a competitor or potential competitor to enter your market space (e.g. a foreign competitor’s new five-year plan now shows interest in developing a domestic capability … Continue reading

Posted in Resources, security, Security Management | Leave a comment

Artifacts of a Malicious Traffic

While Investigating the Suspicious Traffic, it is important for an analyst to be clear what is really suspicious or not. Below are few artifacts an analyst can observe to conclude if it is malicious or not. ARTIFACTS OF MALICIOUS IP … Continue reading

Posted in security | Tagged , , , | Leave a comment

New Mode of delivering Malware Payload by Exploit Kits

Huh… Exploit writers have come up with new mode of delivering malware payload. The current pattern of exploit kit is malicious webpage -> Exploit (Java/PDF/others) -> Exploits download the malicious executable. we have devised appropriate signatures for these patterns, malware … Continue reading

Posted in security | Tagged , , | Leave a comment

Leaveraging Third Party Intelligence to protect your organization

While Having a good traditional secure architecture is important and also very important to have Third Party intellegence to foster security of your organization. Gone are the days reactive security handling protect your organization. Being proactive is highly needed and … Continue reading

Posted in Articles, security, Security Management, Uncategorized | Leave a comment

Superb Automated Malware Binary Analysis Service – Figure out what malware does in minutes

These days, malware are VM aware to defend against automated analysis tools such as anubis, cukoo. And these automated analysis are based on behaviour analysis of malware that gives only tip of what actually it does as they are now … Continue reading

Posted in Articles, Notes, security | Tagged , , | Leave a comment

Data Loss Prevention

DLP Technology is just a technology and is effective when implemented with business case driven by specific requirement.     Full notes – HERE

Posted in Articles, Notes, security | Leave a comment

Oh Shit.Yahoo mail is XSS vulnerable stealing cookies – zeroday

Just seen a yahoo e-mail exploit stealing yahoo cookie from yahoo email. This is no good.. Yahoo mail is XSS vulnerable as it failed to validate FROM field Email Header You receive a email exploit and you open in it … Continue reading

Posted in Articles, security | Tagged , | Leave a comment