article thumbnail

Malware Training Sets: FollowUP

Security Affairs

For example for i in */.json; I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. Some of them are listed here, but many others papers, articles and researches have been released (just ask to Google).

article thumbnail

Free Tools: spotting APTs through Malware streams

Security Affairs

There are many ways to spot Advanced Persistent Threats, for example during a forensic analysis on “high rate incident” or having sandbox systems on critical infrastructures or again working as incident responder for big companies, working into a national CERT or building a simple tool performing analysis on Malware streams.

article thumbnail

RedTorch Formed from Ashes of Norse Corp.

Krebs on Security

Known locations results are based on social media profiles and metadata where, for example, there was an image posted that showed GPS location, or the profile mentions locations among its comments. Rather, they were against “honeypot” systems set up by Norse to mimic a broad range of devices online.