TSEC NEWS: 06.05.21 Cron-Job Fehlerhaft nach PHP Update + PWA mobile + Desktop / 04.05.21 - Android App von TSECURITY 28.04.21 - NEUER SERVER // 26.04.21 ++ Download the Electron-App für tsecurity.de // Über 550 Feed-Quellen


❈ Zscaler und ServiceNow integrieren erweitertes Threat Detection und Response

IT Security Nachrichten google.com

Das kombinierte Angebot baut auf der führenden Cloud Sicherheit Threat ... Mit der Integration von Zscaler Data Protection können Kunden den ......


Kompletten Artikel lesen (externe Quelle: https://www.google.com/url?rct=j&sa=t&url=https://www.infopoint-security.de/zscaler-und-servicenow-integrieren-erweitertes-threat-detection-und-response/a27855/&ct=ga&cd=CAIyGTRiZTZmY2RmMzZhYjA0M2Y6ZGU6ZGU6REU&usg=AFQjCNFvE0CeAGRAJ_GI4lyc9giLC0RgGg)

Zur Startseite

➤ Weitere Beiträge von Team Security | IT Sicherheit (tsecurity.de)

TA18-074A: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

vom 398.46 Punkte
Original release date: March 15, 2018Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bu

TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors

vom 353.68 Punkte
Original release date: October 20, 2017 | Last revised: October 23, 2017Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Secur

AA20-259A: Iran-Based Threat Actor Exploits VPN Vulnerabilities

vom 328.33 Punkte
Original release date: September 15, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was writte

Threatspec - Continuous Threat Modeling, Through Code

vom 293.61 Punkte
Threatspec is an open source project that aims to close the gap between development and security by bringing the threat modelling process further into the development process. This is achieved by having developers and security engineers write threat modeling

AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

vom 289.02 Punkte
Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly

AA20-258A: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity

vom 268.35 Punkte
Original release date: September 14, 2020SummaryThe Cybersecurity and Infrastructure Security Agency (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and com

AutoRecon - Multi-Threaded Network Reconnaissance Tool Which Performs Automated Enumeration Of Services

vom 224.48 Punkte
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. The tool works by firstly performing port scans/service detection scans. From those initial results, the tool will launch further enum

AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments

vom 217.76 Punkte
Original release date: January 8, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This Alert is a companion alert to

AA19-339A: Dridex Malware

vom 198.61 Punkte
Original release date: December 5, 2019SummaryThis Alert is the result of recent collaboration between Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN

AA20-275A: Potential for China Cyber Response to Heightened U.S.–China Tensions

vom 181.51 Punkte
Original release date: October 1, 2020SummaryThis Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. In light of heightened

Custom object detection in the browser using TensorFlow.js

vom 177.22 Punkte
A guest post by Hugo Zanini, Machine Learning Engineer Object detection is the task of detecting where in an image an object is located and classifying every object of interest in a given image. In computer vision, this technique is used in applica

AA20-107A: Continued Threat Actor Exploitation Post Pulse Secure VPN Patching

vom 176.32 Punkte
Original release date: April 16, 2020SummaryNote: This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques and mitigations. This Alert provides an u

Team Security Diskussion über Zscaler und ServiceNow integrieren erweitertes Threat Detection und Response