@fromogil Profile picture

Gil Fromovitch

@fromogil

Joined April 2009
Similar User
Joe Garcia photo

@jgarcia62

Alexander Urbelis photo

@aurbelis

Raymond Meijll photo

@RMeijll

silent movie photo

@standbymeno

New vulnerability in Azure Functions. Prioritize the runtime environment to make sure you don’t have malicious code in your systems hubs.li/H0FxbVN0


Don't wait for an alert from your EDR. Proactively hunt for malicious code hidden in-memory on your endpoints. Learn more about @IntezerLabs new In-Memory Hunter hubs.li/H0F2GJ00

fromogil's tweet image. Don't wait for an alert from your EDR.

Proactively hunt for malicious code hidden in-memory on your endpoints.

Learn more about @IntezerLabs new In-Memory Hunter
hubs.li/H0F2GJ00

Several Windows threats launched ELF malware for the first time in 2020 hubs.li/H0CXvll0


Features and limitations of the security tools natively available on Azure. hubs.li/H0CJpdF0


Russian APT28 using COVID-19 vaccine phishing lures to deliver the Go version of #Zebrocy malware. Via @IntezerLabs hubs.li/H0Cj4kQ0

fromogil's tweet image. Russian APT28 using COVID-19 vaccine phishing lures to deliver the Go version of #Zebrocy malware. Via @IntezerLabs hubs.li/H0Cj4kQ0

Free Cloud Workload Protection. Proven Linux threat detection, no manual policies or overhead, and no slowdown in performance. Intezer Protect community edition now available. #ProtectTheCloud hubs.li/H0C6l0g0


Exploring the security tools and services delivered by the Big 3 cloud platforms. First up, Amazon Web Services #AWS hubs.li/H0B97Gl0

fromogil's tweet image. Exploring the security tools and services delivered by the Big 3 cloud platforms. First up, Amazon Web Services #AWS hubs.li/H0B97Gl0

Migrating to the cloud? This article provides practical advice to help you maintain compliance as you transition your traditional data center to the cloud hubs.li/H0yQB-G0

fromogil's tweet image. Migrating to the cloud? This article provides practical advice to help you maintain compliance as you transition your traditional data center to the cloud hubs.li/H0yQB-G0

DIY code connections cluster 🛠️ In this @IntezerLabs workshop learn how to map your own code connections for the threats that affect you hubs.li/H0yC7KN0

fromogil's tweet image. DIY code connections cluster 🛠️ In this @IntezerLabs workshop learn how to map your own code connections for the threats that affect you hubs.li/H0yC7KN0

What controls should you consider when developing your cloud security strategy? Intezer has you covered. Check out Part 1 in this blog series, Cloud Workload Security: What You Need to Know hubs.li/H0x-qJp0 #cloud #InfoSec

fromogil's tweet image. What controls should you consider when developing your cloud security strategy? Intezer has you covered. Check out Part 1 in this blog series, Cloud Workload Security: What You Need to Know hubs.li/H0x-qJp0 #cloud #InfoSec

As generations of #Emotet get better at evading detection through the use of polymorphic packers, Genetic Analysis of the payload after unpacking reveals its code remains mostly the same hubs.li/H0xvLPj0

fromogil's tweet image. As generations of #Emotet get better at evading detection through the use of polymorphic packers, Genetic Analysis of the payload after unpacking reveals its code remains mostly the same hubs.li/H0xvLPj0

Attackers are embracing Golang as their programming language of choice to develop malware that target both Windows and Linux systems. You too can detect cross-platform malware with the code reuse feature for Golang in Intezer Analyze hubs.li/H0wxgsy0

fromogil's tweet image. Attackers are embracing Golang as their programming language of choice to develop malware that target both Windows and Linux systems. You too can detect cross-platform malware with the code reuse feature for Golang in Intezer Analyze hubs.li/H0wxgsy0

Some of the most prominent nation-state actors are increasingly targeting Linux systems. Intezer looked back on the previous decade of Linux APT attacks hubs.li/H0wn7kT0

fromogil's tweet image. Some of the most prominent nation-state actors are increasingly targeting Linux systems. Intezer looked back on the previous decade of Linux APT attacks hubs.li/H0wn7kT0

Protecting the runtime of cloud workloads while standing up a critical CSPM program is an important last line of defense and one of the first actions you can take to reduce risk hubs.ly/H0vZfDW0

fromogil's tweet image. Protecting the runtime of cloud workloads while standing up a critical CSPM program is an important last line of defense and one of the first actions you can take to reduce risk hubs.ly/H0vZfDW0

There are nearly 100 techniques an attacker can use to launch a cyber attack on your Linux cloud servers. This new matrix from Intezer categorizes these TTPs and includes the recommended way to detect each adversarial technique in your system hubs.li/H0vTlHl0

fromogil's tweet image. There are nearly 100 techniques an attacker can use to launch a cyber attack on your Linux cloud servers. This new matrix from Intezer categorizes these TTPs and includes the recommended way to detect each adversarial technique in your system hubs.li/H0vTlHl0

TeamTNT abusing a legitimate tool to gain full control over victim servers—essentially functioning as a backdoor. To @IntezerLabs knowledge, this is the first time an attacker has used legitimate third party software to target cloud infrastructure hubs.li/H0vP6bx0

fromogil's tweet image. TeamTNT abusing a legitimate tool to gain full control over victim servers—essentially functioning as a backdoor. To @IntezerLabs knowledge, this is the first time an attacker has used legitimate third party software to target cloud infrastructure hubs.li/H0vP6bx0

This article presents a tutorial on how you can create YARA signatures to find malware that use Offensive Security Tool (OST) libraries hubs.li/H0vBrz50

fromogil's tweet image. This article presents a tutorial on how you can create YARA signatures to find malware that use Offensive Security Tool (OST) libraries hubs.li/H0vBrz50

Undetected attack actively infecting vulnerable #Docker servers in the cloud. Attacker uses a novel Domain Generation Algorithm (DGA) based on a Dogecoin digital wallet to generate C&C domains hubs.ly/H0t0rdB0


What is Zero Trust Execution? Definition, Adoption & More hubs.ly/H0sRJV60

fromogil's tweet image. What is Zero Trust Execution? Definition, Adoption & More hubs.ly/H0sRJV60

Chief Growth Officer Justin Bradley talks Zero Trust Execution with @securityweekly Watch the interview here hubs.ly/H0sNhC80


United States Trends
Loading...

Something went wrong.


Something went wrong.