Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date ToddyCat: an overview of a new APT group Giampaolo Dedola ToddyCat is a relatively new advanced persistent threat (APT) actor that came to prominence in late 2020, and has been expanding – both technologicall... March 28, 2023 5:00am BPFDoor and So Much More: An Analysis of Linux Network Passive Backdoors Nicole Carignan, CounterCraft, Customer Success Manager, and David Barroso, CounterCraft, CEO Passive backdoors are implants designed to be stealthier than common backdoors, especially by avoiding listening on ports or pinging back to a Command... 4 months ago | 48 mins Symbiote 101: How to Secure Users Against this Advanced Linux Malware Dmitry Bestuzhev, Most Distinguished Threat Researcher | BlackBerry A few months ago, in a joint collaboration with Intezer, we discovered a new, previously undetected malware that acts in a parasitic nature and affect... 3 months ago | 30 mins Software Supply Chain: Backdoors to your application hiding in plain sight Eran Orzel, Co-Founder, Argon an Aqua Security Company Supply chain attacks have been the trending topic of the year. But how are attackers actually breaching software supply chains? What is the real sour... 9 months ago | 45 mins Lessons from SUNBURST: Closing the backdoor Rishi Sharma, Senior Systems Engineer, Mandiant and Narayan Arkshali, Channel Account Manager, Mandiant A sophisticated threat actor took advantage of SolarWinds’ Orion Platform to orchestrate a wide-scale supply chain attack and deploy a backdoor we cal... 1 year ago | 40 mins Three NEW Ransomware Exploits - How to Close the Backdoor George Crump, StorONE CMO Ransomware attacks are now using three new exploits to force you into paying the ransom. Bad actors know that you will resort to your backups in respo... 1 year ago | 38 mins Cyber Security Ratings Are a Thing, What Do I Do Now? Josh Fazio, Senior Sales Engineer, and Miryam Meir, Senior Director of Product Marketing, at SecurityScorecard As more and more companies connect together, it has never been more critical to understand the risk posed by third-party vendors. If their security po... 7 months ago | 60 mins Mechanical Backdoors in Cold War Encryption Machines Marcus Scharra & Marcus Sachs "Freaking Out" is a senhasegura initiative in which the staff present topics according to their expertise to strengthen internal communication. The J... 2 years ago | 68 mins May TRU Intelligence Briefing Ryan Westman, Paul Aitken, Keegan Keplinger, Derek Thomas, Spence Hutchinson Join eSentire’s Threat Response Unit (TRU) as they share new research-driven observations of malware, notable vulnerabilities, threat actor groups, an... 11 months ago | 45 mins Intelligence Sharing: The Key to Stopping Breaches Is Teaming Up Andrew de Lange, Technical Director, MEA at Anomali A Real-World Example of the Benefits of Sharing Threat Intelligence When Andrew de Lange was the head of intelligence and incident response at a majo... 11 months ago | 29 mins Load more