Encore: remote access Trojan or RAT (noun)
Hacking Humans12 Joulu 2023

Encore: remote access Trojan or RAT (noun)

From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(770)

Log4j vulnerability (noun) [Word Notes]

Log4j vulnerability (noun) [Word Notes]

Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.  CyberWire Glossa...

13 Touko 20259min

What’s inside the mystery box? Spoiler: It’s a scam!

What’s inside the mystery box? Spoiler: It’s a scam!

As Dave Bittner is at the RSA Conference this week, our hosts ⁠⁠Maria Varmazis and ⁠⁠Joe Carrigan⁠⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that a...

8 Touko 202546min

OWASP broken access control (noun) [Word Notes]

OWASP broken access control (noun) [Word Notes]

Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security contr...

6 Touko 20257min

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠Selena Larson⁠, ⁠Proofpoint⁠ intellige...

6 Touko 202539min

The prince, the pretender, and the PSA.

The prince, the pretender, and the PSA.

As Maria is on vacation this week, our hosts ⁠Dave Bittner⁠ and ⁠Joe Carrigan⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. ...

1 Touko 202528min

OWASP security misconfiguration (noun) [Word Notes]

OWASP security misconfiguration (noun) [Word Notes]

Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/...

29 Huhti 20257min

When AI lies, hackers rise.

When AI lies, hackers rise.

This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal explo...

24 Huhti 202542min

OWASP insecure design (noun) [Word Notes]

OWASP insecure design (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https:/...

22 Huhti 20258min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
viisupodi
tervo-halme
rss-podme-livebox
rss-pinnalla
rss-asiastudio
rikosmyytit
otetaan-yhdet
aihe
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
rss-kaikki-uusiksi
rss-ulkopoditiikkaa
the-ulkopolitist
rss-raha-talous-ja-politiikka
rss-girls-finish-f1rst