Cyber Intelligence Feeds
243 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Tamer Ibrahim
Scoop.it!

Malware threat to Opera users, Trojan signed with a stolen certificate

Malware threat to Opera users, Trojan signed with a stolen certificate | Cyber Intelligence Feeds | Scoop.it
On June 19, Browser maker Opera admitted that, it discovered an attack on its internal network infrastructure and windows users may have been tricked into installing a Trojan signed with a stolen Opera certificate.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

DEFT Linux 8 public beta & DART 2 stable ready for download

DEFT Linux 8 public beta & DART 2 stable ready for download | Cyber Intelligence Feeds | Scoop.it
Hello guys! First of all: sorry for the delay! Life is made up of priority and sometimes you have to set aside projects and hobbies for the real life!
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Dashboard - Security Database

Dashboard - Security Database | Cyber Intelligence Feeds | Scoop.it
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.
Tamer Ibrahim's insight:

One of the dashboard to be followed and analyzed daily for threats

more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

DeepEnd Research - Library of Malware Traffic Patterns

DeepEnd Research - Library of Malware Traffic Patterns | Cyber Intelligence Feeds | Scoop.it
Update May 6, 2013 We added ability to download corresponding samples and pcaps (when available)
Traffic analysis has been the primary method of malware identification and thousands of IDS signatures developed are the daily proof.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Collection of Pcap files from malware analysis

Collection of Pcap files from malware analysis | Cyber Intelligence Feeds | Scoop.it
I did some spring cleaning yesterday and came up with these malware and exploit pcaps. Such pcaps are very useful for IDS and signature testing and development, general education, and malware identification.
Tamer Ibrahim's insight:

good source for practicing network malware analysis

more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Blackhole Spam Run Evades Detection Using Punycode

Blackhole Spam Run Evades Detection Using Punycode | Cyber Intelligence Feeds | Scoop.it
The Blackhole Exploit Kit (BHEK) spam run has already assumed various disguises during its course.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Zeus is back with a vengeance

Zeus and its ZBOT brethren are coming back down off banking-Trojan Olympus to take another whack at the financial services game.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Infosecurity - Companies slow in reacting to breach notifications

Infosecurity - Companies slow in reacting to breach notifications | Cyber Intelligence Feeds | Scoop.it
Most corporate security incidents are uncovered by a third party, like a security firm, that picks up on evidence of nefarious activity being carried out by infected machines.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

ZeuS/ZBOT Malware Shapes Up in 2013

ZeuS/ZBOT Malware Shapes Up in 2013 | Cyber Intelligence Feeds | Scoop.it
The notorious info-stealing ZeuS/ZBOT variants are reemerging with a vengeance, with increased activity and a different version of the malware seen this year.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Windows zero day vulnerability publicly exposed by Google engineer

Windows zero day vulnerability publicly exposed by Google engineer | Cyber Intelligence Feeds | Scoop.it
Windows zero day vulnerability publicly exposed by Google engineer Tavis Ormandy
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Security Intelligence | TrendLabs - Trend Micro

Security Intelligence | TrendLabs - Trend Micro | Cyber Intelligence Feeds | Scoop.it
Security Intelligence by TrendLabs provides Internet security research information on malware, viruses, trojans, adware and other Internet security threats
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Does Microsoft spy on Skype conversations?

Does Microsoft spy on Skype conversations? | Cyber Intelligence Feeds | Scoop.it
Skype … once upon a time a VOIP application considered very secure and wiretap-proof, it was the common belief that no one could intercept such communications due a complex mechanism for the management of audio / video and text streams.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Carberp Remote Code Execution: Carpwned

Carberp Remote Code Execution: Carpwned | Cyber Intelligence Feeds | Scoop.it
Everyone are looking at the Carberp source, bootkit and other components but did people investigated the panels source ?
I don't know who did the PHP but he deserve a medal, it's more easy to hack than SpyEye.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

MiltonSTART by Milton Security, Security Threats in the wild

Tamer Ibrahim's insight:

Another dashboard to be followed

more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Verizon DBIR 2013 Highlights and Favorites

Verizon DBIR 2013 Highlights and Favorites | Cyber Intelligence Feeds | Scoop.it
Here is my collection of favorites and highlights from Verizon 2013 Data Breach Investigations Report [PDF] “If your organization is indeed a target of choice, understand as much as you can about what your opponent is likely to do and how far they...
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Comment on A (Graphical) World of Botnets and Cyber Attacks by vanBelkum

Comment on A (Graphical) World of Botnets and Cyber Attacks by vanBelkum | Cyber Intelligence Feeds | Scoop.it
Thanks, for this great summary of source of real time information.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Linkz for Tools & Tips

Linkz for Tools & Tips | Cyber Intelligence Feeds | Scoop.it
In this edition of Linkz I’m talking about tools I came across in the past week. There are tool updates, new tools, and some tips about existing tools. Without further ado ….
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

DHS finds critical vulnerability in software used for background checks

The US Department of Homeland Security (DHS) is facing a possible data breach thanks to the software it has been relying on to help process background checks for potential employees.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

1-15 May 2013 Cyber Attacks Timeline

1-15 May 2013 Cyber Attacks Timeline | Cyber Intelligence Feeds | Scoop.it
And here we are with our bi-weekly review of the main cyber attacks. This time is the turn of the first half of May.
Tamer Ibrahim's insight:

Worth study if any of these apply to your organization then you have to plan for incident response and mitigation approach

more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Alert-driven vs Exploration-driven Security Analysis

Alert-driven vs Exploration-driven Security Analysis | Cyber Intelligence Feeds | Scoop.it
Is alert-driven security workflow “dead”?! It is most certainly not.
Tamer Ibrahim's insight:

Excellent highlight to be considered by Security Operation

more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Worm Creates Copies in Password-Protected Archived Files

Worm Creates Copies in Password-Protected Archived Files | Cyber Intelligence Feeds | Scoop.it
Typically users archive file to lump several files together into a single file for convenience or to simply save storage space. However, we uncovered a worm that creates copies of itself even on password-protected archived files.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Worm Creates Copies in Password-Protected Archived Files | Security Intelligence Blog | Trend Micro

Worm Creates Copies in Password-Protected Archived Files | Security Intelligence Blog | Trend Micro | Cyber Intelligence Feeds | Scoop.it
WORM_PIZZER.A was seen to create copies of itself most notably on archived files.
more...
No comment yet.
Scooped by Tamer Ibrahim
Scoop.it!

Unleashing auto_rip

Unleashing auto_rip | Cyber Intelligence Feeds | Scoop.it
The most common question someone asks me after they find out the work I do for a living is “what tools do you use”. This occurs regardless if the person only knows about digital forensics from TV shows or if they are a fellow practitioner.
more...
No comment yet.