Similar User
@jgarcia62
@aurbelis
@RMeijll
@standbymeno
New vulnerability in Azure Functions. Prioritize the runtime environment to make sure you don’t have malicious code in your systems hubs.li/H0FxbVN0
Don't wait for an alert from your EDR. Proactively hunt for malicious code hidden in-memory on your endpoints. Learn more about @IntezerLabs new In-Memory Hunter hubs.li/H0F2GJ00
Features and limitations of the security tools natively available on Azure. hubs.li/H0CJpdF0
Russian APT28 using COVID-19 vaccine phishing lures to deliver the Go version of #Zebrocy malware. Via @IntezerLabs hubs.li/H0Cj4kQ0
Free Cloud Workload Protection. Proven Linux threat detection, no manual policies or overhead, and no slowdown in performance. Intezer Protect community edition now available. #ProtectTheCloud hubs.li/H0C6l0g0
Exploring the security tools and services delivered by the Big 3 cloud platforms. First up, Amazon Web Services #AWS hubs.li/H0B97Gl0
Migrating to the cloud? This article provides practical advice to help you maintain compliance as you transition your traditional data center to the cloud hubs.li/H0yQB-G0
DIY code connections cluster 🛠️ In this @IntezerLabs workshop learn how to map your own code connections for the threats that affect you hubs.li/H0yC7KN0
What controls should you consider when developing your cloud security strategy? Intezer has you covered. Check out Part 1 in this blog series, Cloud Workload Security: What You Need to Know hubs.li/H0x-qJp0 #cloud #InfoSec
As generations of #Emotet get better at evading detection through the use of polymorphic packers, Genetic Analysis of the payload after unpacking reveals its code remains mostly the same hubs.li/H0xvLPj0
Attackers are embracing Golang as their programming language of choice to develop malware that target both Windows and Linux systems. You too can detect cross-platform malware with the code reuse feature for Golang in Intezer Analyze hubs.li/H0wxgsy0
Some of the most prominent nation-state actors are increasingly targeting Linux systems. Intezer looked back on the previous decade of Linux APT attacks hubs.li/H0wn7kT0
Protecting the runtime of cloud workloads while standing up a critical CSPM program is an important last line of defense and one of the first actions you can take to reduce risk hubs.ly/H0vZfDW0
There are nearly 100 techniques an attacker can use to launch a cyber attack on your Linux cloud servers. This new matrix from Intezer categorizes these TTPs and includes the recommended way to detect each adversarial technique in your system hubs.li/H0vTlHl0
TeamTNT abusing a legitimate tool to gain full control over victim servers—essentially functioning as a backdoor. To @IntezerLabs knowledge, this is the first time an attacker has used legitimate third party software to target cloud infrastructure hubs.li/H0vP6bx0
This article presents a tutorial on how you can create YARA signatures to find malware that use Offensive Security Tool (OST) libraries hubs.li/H0vBrz50
Undetected attack actively infecting vulnerable #Docker servers in the cloud. Attacker uses a novel Domain Generation Algorithm (DGA) based on a Dogecoin digital wallet to generate C&C domains hubs.ly/H0t0rdB0
Chief Growth Officer Justin Bradley talks Zero Trust Execution with @securityweekly Watch the interview here hubs.ly/H0sNhC80
United States Trends
- 1. #CUTOSHI 6.479 posts
- 2. CORY 33,2 B posts
- 3. taemin 24,2 B posts
- 4. Devin Williams 13,8 B posts
- 5. $DUCK 10,4 B posts
- 6. Friday the 13th 117 B posts
- 7. #SantaChat 6.276 posts
- 8. #HappyBirthdayTaylor 25,9 B posts
- 9. Nestor 14,2 B posts
- 10. Luxembourg 20,4 B posts
- 11. Brewers 10,5 B posts
- 12. Durbin 6.120 posts
- 13. Cubs 13,1 B posts
- 14. #JoyfullyRoku N/A
- 15. Big Bass Christmas Bash N/A
- 16. Tucker 37,6 B posts
- 17. #CandyConversation N/A
- 18. Nancy Pelosi 64,1 B posts
- 19. Ciri 145 B posts
- 20. Weaver 4.781 posts
Something went wrong.
Something went wrong.