Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Operating System

Below you will find reports with the tag of “Operating System”

image from PLATINUM continues to evolve, find ways to maintain invisibility

PLATINUM continues to evolve, find ways to maintain invisibility

Microsoft has come across an evolution of PLATINUM’s file-transfer tool, one that uses the Intel® Active Management Technology (AMT) Serial-over-LAN (SOL) channel for communication. This channel works independently of the operating system (OS), rendering any communication over it invisible to firewall and network monitoring applications running on the host device. Until this incident, no malware had been discovered misusing the AMT SOL feature for communication.

(more available)
Added: November 15, 2018
image from Win32/Industroyer

Win32/Industroyer

This report offers insight into the Win32/Industroyer a new threat for industrial control systems.

Added: November 15, 2018
image from Operation Electric Powder - Who is Targeting Israel Electric Company

Operation Electric Powder - Who is Targeting Israel Electric Company

From April 2016 until at least February 2017, attackers have been spreading malware via fake Facebook profiles and pages, breached websites, self-hosted and cloud based websites. Various artifacts indicate that the main target of this campaign is IEC – Israel Electric Company. These include domains, file names, Java package names, and Facebook activity. We dubbed this campaign “Operation Electric Powder“.

(more available)
Added: November 15, 2018
image from Dissecting the APT28 Mac OS X Payload

Dissecting the APT28 Mac OS X Payload

This report analyzes the Mac specific malware from APT28 named Trojan.MAC.APT28

Added: November 12, 2018
image from 15 Server Privilege Management Use Cases For Unix & Linux

15 Server Privilege Management Use Cases For Unix & Linux

This white paper explains common use cases for privilege management on Unix/Linux servers.

Added: October 26, 2018
image from 2015 Mobile Malware Report

2015 Mobile Malware Report

This document deals with malware on mobile devices.

Added: October 26, 2018
image from 2016 Vulnerability Statistics Report

2016 Vulnerability Statistics Report

This document discusses the vulnerabilities discovered by edgescanTM over the past year – 2016. The vulnerabilities discovered are a result of providing “Fullstack” continuous vulnerability management to a wide range of client verticals; from Small Businesses to Global Enterprises, From Telecoms & Media companies to Software Development, Gaming, Energy and Medical organisations. The statistics are based on the continuous security assessment & management of over 57,000 systems distributed globally.

(more available)
Added: October 26, 2018
image from A Guide To Endpoint Privilege Management: Secuirty Fundamentals

A Guide To Endpoint Privilege Management: Secuirty Fundamentals

In this whitepaper you will learn what endpoint privilege management is and how an effective approach significantly enhances an organization’s security against rising cyber crime. They cover the origins of the least privilege concept, the benefits of application control, the current cyber threat landscape and how endpoint privilege management works to combat this with minimal disruption to user productivity.

(more available)
Added: October 26, 2018
image from A Survival Guide To Using GPL

A Survival Guide To Using GPL

This white paper discusses the principals of the GNU Public License (GPL), the risks of using GPL-licensed code, and how GPL code may be used in proprietary products while minimizing legal compliance issues.

(more available)
Added: October 26, 2018
image from Applying Deception Mechanisms for Detecting Sophisticated Cyber Attacks

Applying Deception Mechanisms for Detecting Sophisticated Cyber Attacks

The research department at TopSpin Security conducted an experiment to investigate the performance of deception technologies in a simulated corporate environment in which more than 50 professional hackers and security experts used their knowledge and skills to try to extract a pre-defined piece of data and stay undetected. The experiment sought to answer a number of questions, including: 1) What kind of attacker will be attracted to what different type of resources (traps)? 2) What deception mechanisms should the defending organization employ? 3) Where should they be placed? 4) What kind of traps should be used Every attack pattern was carefully monitored and upon completion the data logged was analyzed and aggregated. Trends, attack patterns and statistics were derived from the data logged.

(more available)
Added: October 26, 2018
image from CoinMiner And Other Malicious Cryptominers Targeting Android

CoinMiner And Other Malicious Cryptominers Targeting Android

SophosLabs takes a specific look at threats being downloaded on GooglePlay that mine a mobile phone’s resources while searching for cryptocurrency.

(more available)
Added: October 26, 2018
image from Cyber Threats To The Aerospace And Defense Industries

Cyber Threats To The Aerospace And Defense Industries

Read about the threat outlook for aerospace and defense sectors as threat groups seek to gain military and economic advantages.

(more available)
Added: October 26, 2018
image from Healthcare And Cross Sector CyberSecurity Volume 16

Healthcare And Cross Sector CyberSecurity Volume 16

This report is specifically geared to the Healthcare and Cross-Sector Cybersecurity Issues.

Added: October 26, 2018
image from The State Of The Kubernetes Ecosystem

The State Of The Kubernetes Ecosystem

This eBook gives a detailed breakdown of the current state of the Kubernetes Ecosystem.

Added: October 26, 2018
image from 2015 Vulnerability Statistics Report

2015 Vulnerability Statistics Report

This document discusses the vulnerabilities discovered by edgescanTM over the past year – 2015. The vulnerabilities discovered are a result of providing continuous vulnerability management to a wide range of client verticals; from Small Businesses to Global Enterprises; Telecoms & Media, Software Development, Gaming, Energy and Medical organizations.

(more available)
Added: October 25, 2018
image from 2016 State Of Privacy & Seecurity Awareness Infographic

2016 State Of Privacy & Seecurity Awareness Infographic

This is an infographic based on the 2016 State of Privacy And Security Awareness Report.

Added: October 25, 2018
image from Encryption -- What's Hiding In Plain Sight

Encryption -- What's Hiding In Plain Sight

The Internet has adapted to encryption at a breakneck speed. Multiple studies indicate a rapid increase of encrypted Internet traffic. Sandvine came out with a paper during February 2016 stating that 70% of the Internet traffic would be encrypted by that year’s end. By mid-2017, we can only predict that the percentage is much higher than 70%.

(more available)
Added: October 25, 2018
image from Investigation: WannaCry Cyber Attack And The NHS

Investigation: WannaCry Cyber Attack And The NHS

This report, out of Great Britain, focuses on the WannaCry Cyber Attack and what they learned in their investigation.

Added: October 25, 2018
image from Kubernetes Deployment And Security Patterns

Kubernetes Deployment And Security Patterns

This is the 2nd ebook from The New Stack’s series focused on the Kubernetes ecosystem. Unlike the 1st ebook that centered on the state of the Kubernetes ecosystem, this ebook shines a light on answering the question: How well does Kubernetes work in production?

(more available)
Added: October 25, 2018
image from Security Intelligence Report Volume 21

Security Intelligence Report Volume 21

This report focuses on software vulnerabilities, software vulnerability exploits, malware, and unwanted software. It is the hope that readers find the data, insights, and guidance provided in this report useful in helping them protect their organizations, software, and users.

(more available)
Added: October 25, 2018
image from Threat Intelligence Executive Report 2017: Volume 2

Threat Intelligence Executive Report 2017: Volume 2

This threat report takes a look at some of the events of spring 2017. Specifically, it looks at the NICKEL GLADSTONE threat group, the Iranian COBALT GYPSY threat group, third party risks, limiting native operating system admin tools.

(more available)
Added: October 25, 2018
  • ««
  • «
  • 3
  • 4
  • 5
  • 6
  • 7
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 5, 2025 20:08 UTC (build b1d7be4)