Articles on Tools
- Malware 8 Practical Tips for Detecting a Website Compromise for Free Detect website compromises using host intrusion detection tools like OSSEC, network IDS watching for anomalies, and centralized log review. Tactical measures include scanning for iframes and...
- Malware Malvertising: How Malicious Ad Campaigns Are Protected Attackers protect malvertising campaigns by obfuscating JavaScript and ActionScript code and timing attacks for weekends when ad network staff aren't working. Malicious logic activates after...
- Malware Malvertising: Some Examples of Malicious Ad Campaigns Malicious banner ads have affected high-profile sites including New York Times, London Stock Exchange, Hoovers, and USNews through networks like DoubleClick, YieldManager, and Microsoft. The Spotify...
- Incident Response Discover Whether a Company Was Hacked - New Service
- Tools Analyze Memory of an Infected System With Mandiant's Redline Mandiant's free Redline tool triages potentially compromised hosts through live memory analysis, replacing Audit Viewer. It uses Memoryze to capture memory, assigns Malware Risk Index scores using...
- Assessments Security Assessment Testing for Client-Side Vulnerabilities Client-side penetration testing mimics real attacks by targeting unpatched desktop software via malicious emails or websites. Three approaches offer increasing intrusiveness: tracking link clicks to...