Архив метки: Powershell

Legit tools exploited in bank heists

Автор: | 22.05.2018

Common IT administration tools are being hijacked to act as invisibility cloaks for cyber criminals targeting financial institutions, according to a report by security firm Carbon Black. The report is based on a survey of CISOs at 40 financial institutions and notes that cyber attacks against financial institutions are most often conducted for the purpose… Читать далее »

Top 5: Things to know about fileless attacks

Автор: | 26.04.2018

Securing your company does mean stopping malware. But in the ever evolving security war, bad actors are turning to what are called fileless attacks that don’t require a payload or tricking someone into installing them. Easy for the bad people, but harder for you. Here are five things to know about fileless attacks: 1. They… Читать далее »

Анонс Windows Server 2019 Insider Preview Build 17650 » Community

Автор: | 25.04.2018

Сегодня компания Microsoft выпустила новую предварительную сборку Windows Server 2019 под номером 17650 для участников программы Windows Insider. Стоит отметить, что Windows Server 2019 предназначена также для клиентов долгосрочного обслуживания (LTSC). Сборки системы включают в себя все нововведения, сделанные ранее в версиях для полугодового канала обслуживания. Подробная информация о всех новшествах размещена на официальной странице… Читать далее »

Windows Admin Center lets users manage Windows servers and Windows 10 machines from the browser

Автор: | 14.04.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: Microsoft has formally released Project Honolulu under a new name: the Windows Admin Center. The WAC is web based and designed to roll all the day-to-day tools for administering Windows servers and workstations into one console. It’s also free to download and use.… Читать далее »

Microsoft Word document and zero-day attacks on the rise

Автор: | 28.03.2018

Dynamic Data Exchange (DDE) attacks top the malware list as hackers increasingly exploited issues in the Microsoft Office standard to execute code, a report reveals. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. You also agree that your personal information may… Читать далее »

Why cybersecurity pros should pay attention to recent warnings about Russian attacks

Автор: | 27.03.2018

It may sound like something out of a Tom Clancy novel, but the situation is all too real. Russian hackers have targeted United States government agencies as well as companies in the infrastructural space such as those in «the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors,» according to the United States Computer… Читать далее »

GhostMiner fileless cryptomining malware has code that kills itself and other strains

Автор: | 24.03.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: A newly-discovered cryptomining malware strain called GhostMiner is the first known fieless mining malware discovered. It also contains advanced competition-killing functions to eliminate other cryptomining infections. Researchers from Minerva Labs have turned GhostMiner’s own capabilities against it by extracting its miner-killing scripts into… Читать далее »

Fileless malware not totally undetectable

Автор: | 15.03.2018

Imagine a malicious software that is almost invisible to security experts. Pretty scary to be blindsided, right? These threats are known as fileless malware. The malware is called “fileless” because it is designed to run entirely in memory and to cover most, if not all, signs of itself on a storage device. By submitting your… Читать далее »

Patch, scan and lock down to counter fileless malware

Автор: | 13.03.2018

We are nearly at the end of Q1, and wondering when those “upstairs” will suddenly come to life and worry about the GDPR deadline on 25th May. But in the meantime, we have other fish to fry, such as the growth of Fileless malware attacks and wondering how best to detect and defend against them. Fileless… Читать далее »

Human, procedural and technical response to fileless malware

Автор: | 13.03.2018

Fileless malware attacks are growing. According to research by the Sans Institute, issued in their 2017 Threat landscape survey, a third of organisations reported experiencing fileless attacks. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. You also agree that your personal information… Читать далее »