Quantcast
Channel: Network Forensics Blog » malware
Browsing all 6 articles
Browse latest View live

Finding Aurora (googlehack)

I was helping a fortune customer yesterday determine if they were targeted by Operation Aurora. From everything we know to date, they were not. How do we know this? We looked. In 15 minutes or so, we...

View Article



IDS Legacy is Institutionalized Failure

The news is rife with discussions about systemic failures in the intelligence community.  It is a good thing we do not judge information security on the same scale of success.  I know of not a SINGLE...

View Article

Move over China, here comes Russia

While the world took pause to consider the implications of Operation Aurora, and Google lent considerable voice to the concept of Advanced and Persistent Threats (APT), we can ill-afford to believe...

View Article

Kneber Update

There was a significant amount of coverage yesterday on research performed by NetWitness into a large set of stolen information recovered from a ZeuS botnet.  Some of the information, analysis, and...

View Article

Network detection of x86 buffer overflow shellcode

Overview This technique can detect overflow exploits against software running on the x86 platform, meaning it applies to Windows, Unix, and Mac shellcode. It not only works independently of OS, but it...

View Article


They are watching you…and your security vendors.

If you’ve ever seen me, or any of the NetWitness crew, speak on malware, advanced threats or the current threat environment, you’ll generally hear more than one recurring theme, one of which is: Your...

View Article
Browsing all 6 articles
Browse latest View live




Latest Images