Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
4 résultats taggé Endpoint  ✕
TCCing is Believing https://objective-see.org/blog/blog_0x7F.html
31/03/2025 19:31:21
QRCode
archive.org
thumbnail

Apple finally adds TCC events to Endpoint Security!
Since the majority of macOS malware circumvents TCC through explicit user approval, it would be incredibly helpful for any security tool to detect this — and possibly override the user’s risky decision. Until now the best (only?) option was to ingest log messages generated by the TCC subsystem. This approach was implemented in a tool dubbed Kronos, written by Calum Hall Luke Roberts (now, of Phorion fame). Unfortunately, as they note, this approach did have it drawbacks:

objective-see EN 2025 macos Apple TCC events Endpoint Security subsystem
CVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability – Horizon3.ai https://www.horizon3.ai/attack-research/attack-blogs/cve-2024-29847-deep-dive-ivanti-endpoint-manager-agentportal-deserialization-of-untrusted-data-remote-code-execution-vulnerability/
13/09/2024 16:59:44
QRCode
archive.org
thumbnail

CVE-2024-29847 Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability.

horizon3 EN 2024 CVE-2024-29847 Ivanti Endpoint Manager AgentPortal Deserialization analysis
Threat Intel Accelerates Detection & Response https://www.huntress.com/blog/threat-intel-accelerates-detection-and-response
15/02/2024 14:28:01
QRCode
archive.org
thumbnail

Evidence of a pre-existing exploit was rendered when the Huntress agent was added to an endpoint. Within minutes, and in part through the use of previously published threat intelligence, analysts were able to identify the issue and make recommendations to the customer to remediate the root cause.

huntress EN 2024 analysis endpoint finger.exe IoC
EDR: Detections, Bypassess and other Shenanigans https://fourcore.io/blogs/edr-detections-bypasses-and-other-shenanigans
28/10/2022 23:17:24
QRCode
archive.org

EDR or Endpoint Detection and Response refers to an integrated endpoint security solution which continuously monitors end-point user's devices and try to prevent anomalies like Malware, Ransomware by using automated rule based response method.

fourcore EN 2022 EDR Detections Bypassess Endpoint Detection Response
4368 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio