exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files

APT1 - Exposing One Of China's Cyber Espionage Units
Posted Feb 19, 2013
Site mandiant.com

Since 2004, Mandiant has investigated computer security breaches at hundreds of organizations around the world. The majority of these security breaches are attributed to advanced threat actors referred to as the "Advanced Persistent Threat" (APT). They first published details about the APT in their January 2010 M-Trends report. As they stated in the report, their position was that "The Chinese government may authorize this activity, but there's no way to determine the extent of its involvement." Now, three years later, they have the evidence required to change their assessment. The details they have analyzed during hundreds of investigations have convinced them that the groups conducting these activities are based primarily in China and that the Chinese Government is aware of them.

tags | paper
SHA-256 | 1b3f3823efbf29735c351791998505a39d8807b0c3599ce1e8c1d5b0fab9843c
APT1 Digital Appendix And Indicators
Posted Feb 19, 2013
Site mandiant.com

This archives lets you access more than 3,000 APT1 indicators including domain names, IP addresses, X.509 encryption certificates and MD5 hashes of malware in APT1's arsenal of digital weapons.

tags | paper
SHA-256 | 315f3c19f14b4adc1e2c28ef69eef91c1a63e02e0e24f73d5d28f72e58ea29af
The Case For SE Android
Posted Jan 17, 2012
Authored by Stephen Smalley | Site selinuxproject.org

Security Enhanced (SE) Android is a project to identify and address critical gaps in the security of Android. Initially, the SE Android project is enabling the use of SELinux in Android in order to limit the damage that can be done by flawed or malicious apps and in order to enforce separation guarantees between apps. However, the scope of the SE Android project is not limited to SELinux.

tags | paper
SHA-256 | fd58220d089e59918851c79a2dc9cf05064f6523abf950376cc9d3bfde453602
DHS OIG Vulnerability Report
Posted Sep 9, 2010
Site dhs.org

Office of Inspector General report OIG-10-1111 - DHS Needs to Improve the Security Posture of Its Cybersecurity Program Systems.

tags | paper
SHA-256 | f3e75b33a925268b83c2b65afa9fa59ba0014a74c9741587b2893bc1c862d1a1
bnd-networks.pdf
Posted Nov 14, 2008
Site secure.wikileaks.org

This PDF document holds a single paged scan of an internally distributed mail from German telecommunications company T-Systems (Deutsche Telekom), revealing over two dozen secret IP address ranges in use by the German intelligence service Bundesnachrichtendienst (BND).

tags | paper
SHA-256 | 03c3e672c0942d58f1aaae14a3c9c00f0aa19a2e39f16d279dd7f8bebcda21f2
DEFE-24-1925.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 15b8515de677f63423d3d174fb60d055cc8de74c354127b75834a87bb27d455f
DEFE-24-1924.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 6b5da090df24ba0f79cb3eeed5c758f29812549afc802e9259cabefba68d8a71
DEFE-24-1923.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 7e46d47db702acacd501a6abe5b7eafb0ea0642bc0bdea15b8f0bf28a04ce865
DEFE-24-1922.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 89a88638ec65d54f58fd3a0a40046b10440b44df56340aa134d164065449b661
DEFE-31-175.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | e7b9886ff3a26ac9d151ccebacb427ad90f13c41ee7167e7fda012c307c2db08
DEFE-31-174.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | ad85996c9f1da29ecf1af16ed8a0f2e0956d841cc11f9ee5a5480c2446ceb0bb
DEFE-31-173.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 395daee97eeb077d8551ab16db1d21a459650c084f6a45e1d8d715404e61c14d
DEFE-31-172.pdf
Posted Jun 11, 2008
Site ufos.nationalarchives.gov.uk

One of eight recently released documents from the Ministry of Defense detailing UFO-related incidents in the United Kingdom.

tags | paper
SHA-256 | 096dcf6a87e56adf0aac64e919d78890397942753cf169654275e6db1f5eb6a8
cybercrime-electoral-system.pdf
Posted Oct 10, 2007
Authored by Oliver Friedrichs | Site symantec.com

Whitepaper titled Cybercrime and the Electoral System.

tags | paper
SHA-256 | fc2dcd7e071c499f8ddbca1dd9d1ee53828e4e34f0ef7d23ffac7d92a00c8545
family_jewels_full.pdf
Posted Jun 29, 2007
Site cia.gov

The CIA released this document, called the "Family Jewels", that holds a compilation of internals reports on operations that were not within the agency's charter. The file details assassination plots against Fidel Castro, use of LSD on citizens, and spying on anti-war protesters. These reports cover the 1950s, 1960s and 1970s.

tags | paper
SHA-256 | cb1ab153f967ae68c264b86f354f8917c7cd08d59eb32631494a6e5cb936fd28
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close