Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Injection attack-

Below you will find reports with the tag of “Injection attack-”

image from "Anonymous Slovakia" Targets NATO and EU Sites

"Anonymous Slovakia" Targets NATO and EU Sites

From the report, “On November 26th, Slovakian Anonymous leader ‘Abaddon’ posted in the deep web message board ‘Hidden Answers’, looking to recruit accomplices for an operation targeting NATO and EU websites. (more available)
Added: January 31, 2019
image from Threat Intelligence: Cybersecurity's Best Kept Secret

Threat Intelligence: Cybersecurity's Best Kept Secret

The goal of this white paper is to bring clarity to cyber threat intelligence. It explains the different categories of CTI and discusses some use cases to illustrate ways it can be applied and utilized to augment security teams’ efficiency and gain an edge over the attackers. (more available)
Added: January 1, 2019
image from Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository

Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository

In mid-July, Palo Alto Networks Unit 42 identified a small targeted phishing campaign aimed at a government organization. While tracking the activities of this campaign, we identified a repository of additional malware, including a web server that was used to host the payloads used for both this attack as well as others. (more available)
Added: November 15, 2018
image from PLATINUM continues to evolve, find ways to maintain invisibility

PLATINUM continues to evolve, find ways to maintain invisibility

Microsoft has come across an evolution of PLATINUM’s file-transfer tool, one that uses the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel for communication. (more available)
Added: November 15, 2018
image from FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY

FireEye Uncovers CVE-2017-8759: Zero-Day Used in the Wild to Distribute FINSPY

FireEye recently detected a malicious Microsoft Office RTF document that leveraged CVE-2017-8759, a SOAP WSDL parser code injection vulnerability. This vulnerability allows a malicious actor to inject arbitrary code during the parsing of SOAP WSDL definition contents. (more available)
Added: November 15, 2018
image from Gazing at Gazer: Turla's New Second Stage Backdoor

Gazing at Gazer: Turla's New Second Stage Backdoor

Herein we release our analysis of a previously undocumented backdoor that has been targeted against embassies and consulates around the world leads us to attribute it, with high confidence, to the Turla group. (more available)
Added: November 15, 2018
image from Carbon Paper: Peering into Turla's second stage backdoor

Carbon Paper: Peering into Turla's second stage backdoor

“The Turla espionage group has been targeting various institutions for many years. Recently, we found several new versions of Carbon, a second stage backdoor in the Turla group arsenal. (more available)
Added: November 15, 2018
image from State Of Software Security Volume 9

State Of Software Security Volume 9

“For a long time now, SOSS has provided a reliable yardstick for the most common vulnerabilities found in software, as well as how organizations are measuring up to security industry benchmarks throughout the software development lifecycle (SDLC). (more available)
Added: November 4, 2018
image from Dridex v4

Dridex v4

The upgraded version of the Dridex Trojan was at one time one of the most successful bank Trojans originally discovered in 2014 and has since re-emerged. (more available)
Added: October 26, 2018
image from H1 2017 Cybersecurity Insights

H1 2017 Cybersecurity Insights

This report is focussed on providing insights based on events in 2017.
Added: October 25, 2018
image from How To Instrument For Adanced Web Application Penetration Testing

How To Instrument For Adanced Web Application Penetration Testing

This technical white paper describes a new approach to identifying your most critical web application vulnerabilities faster and at lower cost. (more available)
Added: October 25, 2018
image from State of the Internet - Security Q4 2016 report

State of the Internet - Security Q4 2016 report

Contributors to this paper include security professionals, including the Security Intelligence Response Team (SIRT), the Threat Research Unit, Information Security, and the Custom Analytics group. (more available)
Added: October 25, 2018
image from Targeted Brand Attacks and Mass Credential Exposures

Targeted Brand Attacks and Mass Credential Exposures

This report helps detail the importance of monitoring suspicious domain registrations to protect a brand from being destroyed by cyber criminals. (more available)
Added: October 25, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. (more available)
Added: October 24, 2018
image from A Step Further - Demystifying XSS

A Step Further - Demystifying XSS

This report provides helpful information on XSS.
Added: October 23, 2018
image from Mobile App Security Methods

Mobile App Security Methods

From The Report, “This article is third in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. (more available)
Added: October 23, 2018
image from Threat Advisory: Ticketac Mobile Apps

Threat Advisory: Ticketac Mobile Apps

This is a threat advisory for Ticketac Mobile Apps
Added: October 22, 2018
image from Application Security Statistics Report 2017

Application Security Statistics Report 2017

This is the 12th annual WhiteHat Security Statistics Report. This year they’ve added some real metrics around DevSecOps. They’ve also added a new SAST section and a mobile security section. (more available)
Added: October 21, 2018
image from Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

Hacker Machine Interface: The State Of SCADA HMI Vulnerabilities

The Stuxnet and Ukranian power grid attacks give us clear ideas about how much damage a determined adversary can inflict not only on the business or operation concerned, but also on the general public. (more available)
Added: October 21, 2018
image from Combating Web Scraping In Online Businesses

Combating Web Scraping In Online Businesses

This report takes a look at the harmful practice of web scraping.
Added: October 20, 2018
image from State of the Internet - Security Q1 2016 report

State of the Internet - Security Q1 2016 report

Get detailed cloud security insights about DDoS and web application attack trends observed across the Akamai Intelligent Platform™ for Q1 2016. (more available)
Added: October 20, 2018
  • ««
  • «
  • 1
  • 2
  • 3
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 22, 2023 16:09 UTC (build fa8bb0e)