Try Now
Dashboard
About
Blog
White Paper
Features
Contacts
Threat Research Blog
DNS Tunneling In The SolarWinds Supply Chain Attack
Sunburst Backdoor, Part III: DGA & Security Software
Prevasio's Role in Red Team Exercises and Pen Testing
Pen testing
,
Red Team
Sunburst Backdoor, Part II: DGA & The List of Victims
Sunburst Backdoor: A Deeper Look Into The SolarWinds' Supply Chain Malware
malware
Home
Older Posts
Subscribe to:
Posts (Atom)
Search This Blog
Filter
Best Practices for Securing Docker Images
CNCF
Container Security
Docker runtime security
Kubernetes Security
malware
Pen testing
Red Team
Popular Posts
Sunburst Backdoor, Part II: DGA & The List of Victims
Previous Part of the analysis is available here . Next Part of the analysis is available here . Update from 19 December 2020: Prevasio ...
Sunburst Backdoor: A Deeper Look Into The SolarWinds' Supply Chain Malware
Update : Next two parts of the analysis are available here and here . As earlier reported by FireEye, the actors behind a global intrus...
Operation "Red Kangaroo": Industry's First Dynamic Analysis of 4M Public Docker Container Images
Linux containers aren't new. In fact, this technology was invented 20 years ago. In 2013, Docker entered the scene and revolutioniz...
Sunburst Backdoor, Part III: DGA & Security Software
In the previous parts of our blog ( part I and part II ), we have described the most important parts of the Sunburst backdoor functionalit...
DNS Tunneling In The SolarWinds Supply Chain Attack
A one-page PDF illustration is available here . The aim of this post is to provide a very high-level illustration of the DNS Tunneling meth...
Kinsing Punk: An Epic Escape From Docker Containers
We all remember how a decade ago, Windows password trojans were harvesting credentials that some email or FTP clients kept on disk in an u...
Drovorub's Ability to Conceal C2 Traffic And Its Implications For Docker Containers
As you may have heard already, the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) released a joint Cybersecuri...
Router Honeypot for an IRC Bot
In our previous post we have provided some details about a new fork of Kinsing malware, a Linux malware that propagates across misconfigur...
Don't Neglect Runtime Container Security
The Web application and service business loves containers, but they present a security challenge. Prevasio has the skills and experien...
Best Practices for Docker Containers' Security
Containers aren't VMs. They're a great lightweight deployment solution, but they're only as secure as you make them. You need to...
Contact
For further information or to talk to an expert, please contact us.
contact@prevasio.com
Contact
Privacy Policy
|
Terms of Use
Copyright © 2020 All Rights Reserved by Prevasio Pty Ltd.
MENU
Home page
Dashboard
About
Blog
White Paper
Features
Contacts