Lateral Movement Technique Employed by Hidden Cobra

US-Cert recently issued notification regarding malicious cyber activity by the North Korean government [1] Hidden Cobra.  There are two families of malware used by the North Korean Government. Remote Access Tool (RAT) known as Jonap A Server Message Block (SMB) worm...
Using Deep Learning for Information Security – Part 1

Using Deep Learning for Information Security – Part 1

Authors: Balamurali A R and Satnam Singh Post Web 2.0, data generated on the internet has increased manifold. This has led to the use of data driven approaches to solve many traditional problems across different industry verticals. Among them, deep learning-based (DL)...
A Game Between Adversary and Defender

A Game Between Adversary and Defender

The motivation for this blog is a question that has been circling in my head for a long time, and I have asked this question to many security analysts: Have they played a game with an adversary? or in other words – Have they engaged with an adversary? I got...
Page 1 of 712345...Last »