- Malware Attributing Cyberattack Activities to a Group in India
Researchers attributed coordinated cyberattacks against South Asian organizations to a group operating from India based on target profiles, decoy document contents, embedded debug strings,...
- Malware Anticipating Cyber Threats Beyond APT
Organizations that experienced APT attacks years ago may offer insights into threats that will eventually reach other companies. Predicted trends include greater use of purchased exploits,...
- Training Free Recorded Malware Forensics and Analysis Webcasts
- Malware When Indicators of Compromise (IOCs) Entered the Mainstream Enterprise
Indicators of Compromise (IOCs) are custom, incident-specific signatures that organizations use to detect attacker artifacts. Mandiant popularized the term around 2007, and by 2015 the concept gained...
- Risk Management Mutually-Assured Destruction as a Factor in Cyber Warfare
Since no practical defense exists against nation-state cyber intrusions, countries may need to compromise adversaries' IT assets to establish mutually-assured destruction as a deterrent. Nations with...
- Malware How Malicious Code Can Run in Microsoft Office Documents
Microsoft Office documents can execute malicious code through VBA macros (requiring social engineering to enable), exploit payloads targeting Office vulnerabilities, embedded Flash objects, or...