Blog

The Latest from Fortify


Threat Feeds
CVE Feed
Loading...

CERT Vulnerability Feed
Loading...

CERT Insider Threat

Insider Threat Incident Analysis by Sector (Part 1 of 9)

Hello, I am Randy Trzeciak, Director of the CERT National Insider Threat Center (NITC). I would like to welcome you ...
Read More

How CERT-RMM and NIST Security Controls Help Protect Data Privacy and Enable GDPR Compliance, Part 1: Identifying Personally Identifiable Information

The costs of the steady stream of data breaches and attacks on sensitive and confidential data continue to rise. Organizations ...
Read More

Challenges Facing Insider Threat Programs and Hub Analysts: Part 2 of 2

In the first post in this two-part series, we covered five unique challenges that impact insider threat programs and hub ...
Read More

Cybersecurity Architecture, Part 2: System Boundary and Boundary Protection

This post was also authored by Andy Hoover. In Cybersecurity Architecture, Part 1: Cyber Resilience and Critical Service, we talked ...
Read More

Challenges Facing Insider Threat Programs and Hub Analysts: Part 1 of 2

The purpose of this two-part blog series is to discuss five challenges that often plague insider threat programs and more ...
Read More

Improving Cybersecurity Governance via CSF Activity Clusters

The National Institute for Science and Technology (NIST) recently released version 1.1 of its Cybersecurity Framework (CSF). Organizations around the ...
Read More

Foundational Research Behind Text Analytics for Insider Threat: Part 2 of 3

In this blog series, I review topics related to deploying a text analytics capability for insider threat mitigation. In this ...
Read More

Considerations for Deploying a Text Analytics Capability for Insider Threat Mitigation: Part 1 of 3

In this blog series I cover topics related to deploying a text analytics capability for insider threat mitigation. A text ...
Read More
Loading...

ISC Bulletins


CVE-2018-10933: libssh 0.8.4 & 0.7.6 security & bugfix release https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/, (Wed, Oct 17th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License ...
Read More

RedHunt Linux – Adversary Emulation, Threat Hunting & Intelligence, (Wed, Oct 17th)

Based on Lubuntu-18.04 x64, the RedHunt Linux virtual machine for adversary emulation and threat hunting is a “one stop shop ...
Read More

VMSA-2018-0026 VMware ESXi, Workstation & Fusion updates address out-of-bounds read vulnerability https://www.vmware.com/security/advisories/VMSA-2018-0026.html, (Wed, Oct 17th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License ...
Read More

CyberChef: BASE64/XOR Recipe, (Tue, Oct 16th)

I often use commandline tools for malware analysis, like for the BASE64/XOR decoding I did in my last diary entry ...
Read More

Maldoc: Once More It's XOR, (Sat, Oct 13th)

I was asked for help with malicious Word document MD5 7ea8e50ce884dab89a13803ccebea26e. Like always, I first run oledump.py on a sample: ...
Read More

More Equation Editor Exploit Waves, (Fri, Oct 12th)

This morning, I spotted another wave of malicious documents that (ab)use again %%cve:2017-11882%% in the Equation Editor (see my yesterday's diary[]) ...
Read More

New Campaign Using Old Equation Editor Vulnerability, (Wed, Oct 10th)

Yesterday, I found a phishing sample that looked interesting: From: [email protected][.]com To: me Subject: RE: Re: Proforma Invoice INV 075 ...
Read More

"OG" Tools Remain Valuable, (Wed, Oct 10th)

For vendors, the cybersecurity landscape is a nice place to make a very lucrative business. New solutions and tools are ...
Read More
Loading...