Win32/Viknok Technical Summary

Written by:  Matthew Clairmont, GCIA, Security Operations Analyst

This entry was posted in Threats & Vulnerabilities, Win32/Viknok on October 28, 2014 by Chad R

The Sweet Orange Exploit Kit

Written by: Emily Cranston, Intel Cyber Analyst

This entry was posted in Threats & Vulnerabilities, Blackhole Exploit Kit, Sweet Orange Exploit on October 17, 2014 by Chad R

CIS Community Update October 2014

Please remember to always copy and paste links.

1. CIS Microsoft Exchange Server 2013 v1.0.0 Benchmark Released
The benchmark provides prescriptive guidance for establishing a secure configuration posture for Microsoft Exchange Server 2013 SP1. This guide was tested against Microsoft Exchange Server 2013 SP1.

Cyber Hygiene: Take These 5 Steps to Cure Your Online Maladies

Cyber Security is Our Shared Responsibility Celebrate National Cyber Security Awareness Month and Help Make a Difference in Improving Security

National Cyber Security Awareness Month (NCSAM) kicked-off in Nashville this morning with a launch event featuring the U.S. Department of Homeland Security, the Center for Internet Security/Multi-State ISAC, the National Association of Chief Information Officers, the National Cyber Security Alliance and many other partners, who gathered to celebrate the eleventh year of Awareness Month.

This entry was posted in Uncategorized on October 01, 2014 by Chad R