shadowbroker They published several leaks of some of the National Security Agency (NSA) hacking tools including zero-day exploits Specifically, exploits and vulnerabilities targeting enterprise firewalls, anti-virus products and Microsoft products, tied to the Equation Group threat actor, NSA’s Tailored Access

Read more

Vulnerability information

The following is a list of online repositories: Repository name Website URL Offensive Security’s Exploit Database Common Vulnerabilities & Exposures (CVE) BugtraqSecurityFocus OSVDB Vulnerabilities Packet Storm National Vulnerability Database IBM ISS X-Force US-CERT

Read more


The six step incident handling process is appropriate for all forms of incidents, including Advanced Persistent Threat (APT) style attackers.  The APT is characteristically well funded teams of workers who are tasked with ex-filtrating intellectual property from targeted organizations.  The

Read more

Pin It on Pinterest