Blog

The Latest from Fortify


Threat Feeds
CVE Feed
Loading...

CERT Vulnerability Feed
Loading...

CERT Insider Threat

Top 5 Incident Management Issues

The CERT Division of the SEI has a history of helping organizations develop, improve, and assess their incident management functions ...
Read More

Insider Threats in Information Technology (Part 6 of 9: Insider Threats Across Industry Sectors)

This blog post was co-authored by Carrie Gardner. As Carrie Gardner wrote in the second blog post in this series, ...
Read More

Insider Threats in State and Local Government (Part 5 of 9: Insider Threats Across Industry Sectors)

This post was co-authored by Drew Walsh. Continuing our industry sector series, this blog post highlights insider threat trends in ...
Read More

Insider Threats in Finance and Insurance (Part 4 of 9: Insider Threats Across Industry Sectors)

This post was co-authored by Jonathan Trotman. In the previous post of our series analyzing and summarizing insider incidents across ...
Read More

Scoping IT & OT Together When Assessing an Organization’s Resilience

The SEI engages with many organizations of various sizes and industries about their resilience. Those responsible for their organization's cybersecurity ...
Read More

Performing Text Analytics for Insider Threat Programs: Part 3 of 3

This blog series reviews topics in performing text analytics to support insider threat mitigation. This post presents a procedural framework ...
Read More

Insider Threats in the Federal Government (Part 3 of 9: Insider Threats Across Industry Sectors)

The CERT National Insider Threat Center (NITC) Insider Threat Incident Corpus contains over 2,000 incidents, which, as Director Randy Trzeciak ...
Read More

Classifying Industry Sectors: Our New Approach to an Industry Sector Taxonomy (Part 2 of 9: Insider Threats Across Industry Sectors)

As Randy Trzeciak mentioned in the first blog in this series, we are often asked about the commonalities of insider ...
Read More
Loading...

ISC Bulletins

Finding Property Values in Office Documents, (Sat, Feb 16th)

In diary entry "Maldoc Analysis of the Weekend", I use the strings method explained in diary entry "Quickie: String Analysis ...
Read More

Old H-Worm Delivered Through GitHub, (Thu, Feb 14th)

Another piece of malicious code spotted on GitHub this time. By the way, this is the perfect example to demonstrate ...
Read More

Suspicious PDF Connecting to a Remote SMB Share, (Thu, Feb 14th)

Yesterday I stumbled upon a PDF file that was flagged as suspicious by a customer's anti-malware solution and placed in the ...
Read More

Fake Updates campaign still active in 2019, (Wed, Feb 13th)

Introduction Last week on 2019-02-06, @baberpervez2 tweeted about a compromised website used by the Fake Updates campaign (link to tweet).  ...
Read More

Microsoft February 2019 Patch Tuesday, (Tue, Feb 12th)

This month, we got patches for 74 vulnerabilities in total. One of them has been exploited and two vulnerabilities have ...
Read More

Have You Seen an Email Virus Recently?, (Mon, Feb 11th)

I did some research into the delivery of the malicious documents I analyzed this weekend (diary entries here and here) ...
Read More

Video: Maldoc Analysis of the Weekend, (Sun, Feb 10th)

I made a video for yesterday's diary entry "Maldoc Analysis of the Weekend" (the analysis of a Word document with ...
Read More

Maldoc Analysis of the Weekend, (Sat, Feb 9th)

Yesterday I received malicious Office document request15.doc (MD5 8598361ecbbffb35900d0720b0316a56). It contains VBA macros that execute a PowerShell script. That script ...
Read More
Loading...