December 2019 Update Executive Summary Threat Overview and Analysis Emotet Activity at UW Emotet Impact Actions and Recommendations More Articles Executive Summary Emotet is a malware “Swiss Army Knife,” offering a wide variety of attackers a number of methods of infection and subsequent actions. It is frequently used in mass malicious email campaigns, as well…
In several of our Information Security Briefing sessions, we have heard about the importance of logging for anomaly detection and incident response. Below is a link to various “cheat sheets” for logging to help you enable and configure system logs. Please note this is not an endorsement of this vendor; we are posting for information…
More Articles Information security researchers have found two major security vulnerabilities, dubbed “Meltdown” and “Spectre,” that affect the processing chips in almost every computer made in the last 20 years (including mobile phones, embedded devices, cloud computers, etc.). These vulnerabilities could allow attackers to steal data, including passwords and other information previously thought to be…