CERT alerts Infomation about BlackEnergy APT employspearfishing with Word documents Late last year, a wave of cyberattacks hit several critical sectors in Ukraine. Widely discussed in the media, the attacks took advantage of known BlackEnergy Trojans as well as several new modules.
CERT alerts A paper about malwares and sandbox analysis Malware sandboxes are automated dynamic analysis systems that execute programs in a controlled environment. Within the large volumes of samples submitted daily to these services, some submissions appear to be different from others and show interesting characteristics.
CERT alerts Information about BlackEnergy trojan, targeting Ukrainian new media and electric industry The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014 (see our previous blog posts on Back in BlackEnergy
CISCO Cisco Annual Security Report 2016 The Cisco 2016 Annual Security Report—which presents research, insights, and perspectives from Cisco Security Research—highlights the challenges that defenders face in detecting and blocking attackers who employ a rich and ever-changing arsenal of tools
FireEye What about the plant floor? - six key weaknesses that an adversary can use to undermine a plant’s operation Industrial enterprises including electric utilities, petroleum companies, and manufacturing organizations invest heavily in industrial control systems (ICS) to efficiently, reliably, and safely operate industrial processes.
Microsoft MS Security Bulletin Summary january 2016 This bulletin summary lists security bulletins released for January 2016.