Duqu

Type: Keyphrase
Name: Duqu
First reported 5 hours ago - Updated 5 hours ago - 1 reports

Re: The Blue Pill of Threat Intelligence

Posted by Curt Wilson on Oct 20 It seems to me that leveraging internal telemetry for accurate and relevantthreat intelligence should be the first step. Anomalous traffic from acentral management server for PoS infrastructure to unknown FTP serversshould ... [Published Daily Dave - 5 hours ago]
First reported Oct 18 2014 - Updated Oct 18 2014 - 1 reports

Global Industrial Control Systems (ICS) Security Market To See 8.0%...

ReportsnReports.com offer “Industrial Control Systems (ICS) Security Market [DDOS, IDS/IPS, Firewall, SIEM, SCADA Encryption, UTM, Application Whitelisting, DLP, Database Activity Monitoring; Professional Services] - Global Advancements, Market Forecast ... [Published PRWeb - Oct 18 2014]
First reported Oct 16 2014 - Updated Oct 17 2014 - 1 reports

Worldwide Industrial Control Systems Security Market Overview, Analysis & Forecast to 2018

Industrial Control Systems (ICS) Security Market [DDOS, IDS/IPS, Firewall, SIEM, SCADA Encryption, UTM, Application Whitelisting, DLP, Database Activity Monitoring; Professional Services] - Global Advancements, Market Forecast & Analysis (2013 - 2018) ... [Published MyNewsDesk - Oct 16 2014]
First reported Oct 14 2014 - Updated Oct 15 2014 - 1 reports

Hackers exploit two more Windows zero-day bugs

Microsoft will patch a pair of zero-day Windows vulnerabilities later today that attackers have been exploiting to penetrate major corporations' networks, researchers at FireEye said Tuesday.The flaws found by FireEye were different than another discovered ... [Published Computerworld UK - Oct 14 2014]
First reported Oct 14 2014 - Updated Oct 14 2014 - 1 reports

Microsoft Security Updates October 2014

This morning was possibly one of the most information rich in the history of Microsoft's patch Tuesdays. Last month , we pointed out the Aurora Panda/DeputyDog actor was losing an IE 0day being patched, and that seemed unusual. This month, several vulnerabilities abused with ... [Published Kaspersky Lab - Oct 14 2014]
First reported Oct 13 2014 - Updated Oct 13 2014 - 1 reports

The Most Famous Malwares in APTA

During my talks and during my daily working life people asks me about the most interesting Malware used to perform Advanced Persistent Targeted Attacks (APTA). So I decided to give my personal answer in this post, beeing concious that things would change ... [Published Security Bloggers Network - Oct 13 2014]
First reported Oct 06 2014 - Updated Oct 06 2014 - 1 reports

Survey Determines What Veteran Teachers Think

(2014-10-06) NEW YORK , Oct. 6, 2014 /PRNewswire/ — Experienced teachers in the northeast recently responded to questions about the Common Core Standards, use of technology in the classroom, their daily routines and how much homework a student should ... [Published DMN Newswire - Oct 06 2014]
Entities: Duqu, New York City
First reported Sep 29 2014 - Updated Sep 29 2014 - 1 reports

Dragonfly/Havex Targeting Pharmaceutical Sector

Dragonfly/Havex Targeting Pharmaceutical Sector The Dragonfly malware previously thought to be focused exclusively on the critical energy and chemical sectors is now thought to be more likely targeting pharmaceutical companies. In the first of four ... [Published Infosecurity - Latest News - Sep 29 2014]
First reported Sep 15 2014 - Updated Sep 15 2014 - 3 reports

Dragonfly malware targeting pharmaceutical companies

The recently revealed Dragonfly (Havex) malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed, according to Belden.Until now, advanced cyberattacks against industry have focused on the critical energy and ... [Published Net Security - Sep 15 2014]
First reported Sep 05 2014 - Updated Sep 05 2014 - 1 reports

Are You Protecting What’s Irreplaceable?

F-Secure (NASDAQ: OMX Helsinki Ltd.) is a global security leader protecting its customers' irreplaceable digital content and online interactions. Headquartered in Finland, the company has a current market cap of 433.53 million Euros.If you think that ... [Published Silicon India - Sep 05 2014]
First reported Aug 04 2014 - Updated Aug 04 2014 - 1 reports

Analysis of the Stuxnet Cyber Weapon Family and Dragonfly

Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu , Flame and Gauss are ... [Published Security Affairs - Aug 04 2014]
First reported Jul 02 2014 - Updated Jul 02 2014 - 1 reports

Operation Dragonfly Imperils Industrial Protocol

Recent headlines ( here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, ... [Published McAfee Blogs - Jul 02 2014]

Quotes

"We know now that Stuxnet and Flame remained hidden in their target networks for years - by the time worms like these do damage or steal trade secrets, it is too late to defend against them.:"
Iranian cyber operations are carried out under the belief that "The cyber arena is actually the arena of the Hidden Imam." [21] Iran’s cyber doctrine relies heavily on asymmetrical warfare tactics...
"The fact that the Careto attackers appear to be speaking the Spanish language is perhaps the most unusual feature," the report says. "While most of the known attacks nowadays are filled with Chinese comments, languages such as German, French or Spanish appear very rarely in APT attacks."
"What makes 'The Mask' special is the complexity of the toolset used by the attackers.This includes an extremely sophisticated malware, a rootkit, a bootkit, 32- and 64-bit Windows versions, Mac OS X and Linux versions, and possibly versions of Android and iPad/iPhone (Apple iOS)." claimed Kaspersky...

More Content

All (25) | News (18) | Reports (0) | Blogs (7) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Re: The Blue Pill of Threat Intelligence [Published Daily Dave - 5 hours ago]
Global Industrial Control Systems (ICS) Securit... [Published PRWeb - Oct 18 2014]
Worldwide Industrial Control Systems Security M... [Published MyNewsDesk - Oct 16 2014]
Microsoft Security Updates October 2014 [Published Kaspersky Lab - Oct 14 2014]
Hackers exploit two more Windows zero-day bugs [Published Computerworld UK - Oct 14 2014]
The Most Famous Malwares in APTA [Published Security Bloggers Network - Oct 13 2014]
Survey Determines What Veteran Teachers Think [Published DMN Newswire - Oct 06 2014]
Dragonfly/Havex Targeting Pharmaceutical Sector [Published Infosecurity - Latest News - Sep 29 2014]
Dragonfly malware targeting pharmaceutical comp... [Published Net Security - Sep 15 2014]
How Dragonfly Hackers and RAT Malware Threaten ... [Published Noodls - Sep 15 2014]
Belden Research Reveals Dragonfly Malware Likel... [Published Town Hall - Sep 15 2014]
Are You Protecting What’s Irreplaceable? [Published Silicon India - Sep 05 2014]
Analysis of the Stuxnet Cyber Weapon Family and... [Published Security Affairs - Aug 04 2014]
Operation Dragonfly Imperils Industrial Protocol [Published McAfee Blogs - Jul 02 2014]
Cyber Security: A Few Troubling Questions [Published Industry 2.0 - May 13 2014]
HP Security Research Threat Intelligence Briefi... [Published HP Security Research Blog - Feb 21 2014]
New global cyber-espionage operation uncovered [Published telecomasia.net - Feb 17 2014]
Possible state-sponsored cyber attack deemed el... [Published Fierce Government IT - Feb 14 2014]
The Most Sophisticated Malware Might Hit You Soon! [Published EFYTimes.com - Feb 11 2014]
Blog: Destructive Malware - Five Wipers in the ... [Published Securelist - Dec 18 2013]
US Cyber Command’s Plan X: Pentagon Launching C... [Published RINF.com - Oct 03 2013]
Industrial control ‘honeypots’ show systems are... [Published GCN - Aug 07 2013]
Security experts analyzing Flame malware [Published Topnews.in - May 31 2012]
Iran admits nuke facilities targeted by ‘Duqu’ ... [Published Topnews.in - Nov 15 2011]
Iran claims detecting virus aimed at nuclear es... [Published Topnews.in - Nov 15 2011]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Re: The Blue Pill of Threat Intelligence [Published Daily Dave - 5 hours ago]
Posted by Curt Wilson on Oct 20 It seems to me that leveraging internal telemetry for accurate and relevantthreat intelligence should be the first step. Anomalous traffic from acentral management server for PoS infrastructure to unknown FTP serversshould ...
Microsoft Security Updates October 2014 [Published Kaspersky Lab - Oct 14 2014]
This morning was possibly one of the most information rich in the history of Microsoft's patch Tuesdays. Last month , we pointed out the Aurora Panda/DeputyDog actor was losing an IE 0day being patched, and that seemed unusual. This month, several vulnerabilities abused with ...
The Most Famous Malwares in APTA [Published Security Bloggers Network - Oct 13 2014]
During my talks and during my daily working life people asks me about the most interesting Malware used to perform Advanced Persistent Targeted Attacks (APTA). So I decided to give my personal answer in this post, beeing concious that things would change ...
Dragonfly/Havex Targeting Pharmaceutical Sector [Published Infosecurity - Latest News - Sep 29 2014]
Dragonfly/Havex Targeting Pharmaceutical Sector The Dragonfly malware previously thought to be focused exclusively on the critical energy and chemical sectors is now thought to be more likely targeting pharmaceutical companies. In the first of four ...
Analysis of the Stuxnet Cyber Weapon Family and... [Published Security Affairs - Aug 04 2014]
Cyber weapons like Stuxnet will only grow in prevalence, use and sophistication and it is therefore in the interest of national security to develop advanced mitigation techniques and capabilities. The progenitor of Duqu , Flame and Gauss are ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.