shadowbroker

shadowbroker They published several leaks of some of the National Security Agency (NSA) hacking tools including zero-day exploits Specifically, exploits and vulnerabilities targeting enterprise firewalls, anti-virus products and Microsoft products, tied to the Equation Group threat actor, NSA’s Tailored Access

Read more

Vulnerability information

The following is a list of online repositories: Repository name Website URL Offensive Security’s Exploit Database https://www.exploit-db.com/ Common Vulnerabilities & Exposures (CVE) https://cve.mitre.org/ BugtraqSecurityFocus http://www.securityfocus.com OSVDB Vulnerabilities http://osvdb.org Packet Storm http://www.packetstormsecurity.org National Vulnerability Database http://nvd.nist.gov IBM ISS X-Force https://exchange.xforce.ibmcloud.com/ US-CERT

Read more

APT SANS

The six step incident handling process is appropriate for all forms of incidents, including Advanced Persistent Threat (APT) style attackers.  The APT is characteristically well funded teams of workers who are tasked with ex-filtrating intellectual property from targeted organizations.  The

Read more

Pin It on Pinterest