She sells root shells by the C(++) shore
ANY.RUN - Interactive malware analysis sandbox
http://any.run/Get fast results in real-time! Intuitive interface. Convenient for any level analysts.
Join for free and start your malware hunting!
Avira Cloud Sandbox API. Completely private, unlimited-scale, automated malware analysis service
https://oem.avira.com/en/solutions/cloud-sandbox-apiAvira’s Cloud Sandbox API is built to ensure data privacy.
Receive detailed, file-specific threat intelligence reports containing actionable intelligence.
Supports MITRE ATT&CK™ framework.
Do APT Mercenary Groups Pose Real Threat to Companies?
https://businessresources.bitdefender.com/apt-as-a-service-webinarLearn about the recent Bitdefender investigation of a new attack attributed to a sophisticated actor offering advanced-persistent-threats-as-a-service.
Access the investigation
Be a part of the cyber resilience story - explore careers at
https://careers.opentext.com/Join the cybersecurity and data protection team at Carbonite + Webroot, OpenText companies.
We don’t just talk about sharing. We do it every day
https://www.cyberthreatalliance.org/our-sharing-model/Find out more about how threat intelligence sharing and collaboration through the Cyber Threat Alliance can function as a force multiplier to improve defenses across the ecosystem.
Map Malicious Infrastructures with Pure Signal™ Intelligence
https://partners.team-cymru.com/pure-signal-trialElite analyst teams use Team Cymru’s Pure Signal platform to access 50+ data types, including global network flow, PDNS, malware and more.
Start your 2-week trial now!
What is cyber threat intelligence (CTI) and how is it used?
Join the VB2020 Threat Intelligence Practitioners’ Summit (TIPS)Join the VB2020 Threat Intelligence Practitioners’ Summit, sponsored by the Cyber Threat Alliance,
to hear from leading industry voices on how CTI sharing can function as a force multiplier to strengthen defenses across the ecosystem.
Kaspersky Threat Intelligence Portal - find cyberthreats in files, URLs, IPs and domains
https://opentip.kaspersky.com/Know which alerts or incidents pose real threats, and prioritize them fast and effectively based on impact and risk levels.
No-Cost Threat Detection for ISPs and Hosting Providers
https://partners.team-cymru.com/nimbus-threat-monitorPartner with Team Cymru and get near-real-time threat detection, powered by our world-class IP Reputation data.
Join us now!
Outsource your Unwanted Software/PUA Work for Free
https://appesteem.com/avsAppEsteem’s feeds sort out the good apps from the Deceptors.
Our criteria are widely accepted. We’ll help with your disputes.
All for Free. Giving you more time to fight real malware.
Do you want to know how IT security products score in independent tests?
https://www.av-comparatives.org/enterprise/latest-tests/AV-Comparatives is an ISO certified independent organization offering systematic testing that checks whether security software lives up to its promises.
Results are available for free!
Defeating Application Fraud - Learn How
https://www.shapesecurity.com/solutionsWe protect more accounts from fraud than everyone else in the world combined.
Shape Security is now part of F5 (www.f5.com)
30+ years of experience in the anti-malware industry
www.virusbulletin.comVirus Bulletin is so much more than just a great conference.
Check out our website to see what more we have to offer.
DNSDB®: The DNS Super Power for Security Teams
https://www.farsightsecurity.com/get-started-guide/Farsight Security DNSDB®: the world's largest real-time and historical database of DNS resolutions.
Get your free DNSDB API key and use it in our newly updated web GUI, DNSDB Scout and your own environments.
Contextualize everything DNS related with one API key - DNSDB.
Tired of home office and in urgent need of some networking?
https://www.amtso.org/newsletter/Join the AMTSO community and meet security vendors, testers, journalists, and researchers to discuss cybersecurity trends, tests and standards!
Downloads
This highlights the importance of a systemic approach that minimizes the impact of human (or soon AI-overlord) mistakes.
In this paper we'll briefly go over some of the existing approaches for hardening software - from virtualization, containerization and sandboxing to smaller-scale in-process focused solutions using a combination of hardware-assisted features with OS support and/or compiler features such as secure enclaves (Intel SGX), memory protection extensions (Intel MPX), ASLR in all modern OSes, GNU RELRO in GNU/Linux, Microsoft's Code Flow Guard, Control-flow Enforcement Technology (CET) Shadow Stack.
We'll also review similar securing efforts used in the browser world (such as Google's NaCl/PNaCl, asm.js, Mozilla's WASM) and discuss the evolution of safety features in modern languages (C++, Rust).
We can then discuss the approach that the security engines team in Symantec (now a division of Broadcom) took a few years back to secure new engine releases. We'll describe how clang/LLVM instrumentation is used to produce hardened binaries which dramatically reduce the risk of remote code execution, denial of service and other attacks, by severely mitigating the impact of bugs such as buffer overflows, unbounded recursion (stack exhaustion), infinite loops. The hardened binaries are then used as templates for micro in-process VMs (where we designate a portion of the process address space to be used as host for a separate execution unit).
We will demonstrate using some proof-of-concept code how this approach handles a few of the typical bugs mentioned above.