Thursday, December 25, 2014

Cyber Network Security Firms and Experts



A recent Sony Pictures Hack that Spear Phishing  was claimed to be used, caused me to seem how many Spear Points it would reveal or just White Hat names to drop.


A:

Ars Technica
http://arstechnica.com/security/2014/12/inside-the-wiper-malware-that-brought-sony-pictures-to-its-knees/
C::

CloudFlare, director of security operations for DEF CON, the world’s largest hacker conference, and the principal security researcher for the world's leading mobile security company, Cloudflare,  NT/NT
E::
Eldos
https://www.eldos.com/rawdisk/
Malwr
https://malwr.com/analysis/MWZkZjU4Mjc1ZTNlNDQzN2FkOWFhNWI1NjNmYjk0Nzc/
N::
Network.om
http://www.networkworld.com/article/2851927/microsoft-subnet/sony-pictures-hacked-by-guardians-of-peace-with-help-from-insiders.html

Re/Code, 
  • Arik Hesseldahl

Y::
YARA
The pattern matching swiss knife for malware researchers (and everyone else)

I:
Identity Finder LLC, a leading provider of sensitive data management solutionshttp://www.identityfinder.com/us/Press/20141204210449


 F::
FBI  http://www.fbi.gov/news/pressrel/press-releases/update-on-sony-investigation

M::

R::

RBS Risk Based Security
https://www.riskbasedsecurity.com/2014/12/a-breakdown-and-analysis-of-the-december-2014-sony-hack/
Recode.net
http://recode.net/2014/12/03/sony-to-officially-name-north-korea-as-source-of-hack-attack/

S::

SOPHOS
http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Destover-C/detailed-analysis.aspx
http://plusvic.github.io/yara/


No comments:

Post a Comment