Profile

Cover photo
1,825 followers|295,438 views
AboutPostsPhotosVideos

Stream

Norse

Shared publicly  - 
 
0000 Security researcher Anthony Joe Melgarejo reports that point-of-sale (PoS) systems are being targeted with a reconnaissance Trojan (TROJ_RECOLOAD.A) which is being delivered by way of the fileless installation functionality of the Angler Exploit Kit. “Fileless installation involves installing the malware into locations that are difficult to scan or detect,” Melgarejo wrote. “The malware exists only in memory and is written directly to RAM in...
2
Add a comment...

Norse

Shared publicly  - 
 
01203 In everyday business, a complex set of external relationships is commonplace. Services, infrastructure, and even software live in the cloud, supplied by third-parties. An organization’s value is often in the data it generates, but how secure is that data across your digital supply chain? Do your external vendors and partners adhere to your security standards? How do you know for sure? They may have …
4
1
Jaroslaw J. Warzecha's profile photo
Add a comment...

Norse

Shared publicly  - 
 
0000 A leading security researcher is raising serious concerns about the stability of the Internet following the disclosure of a now patched critical vulnerability in BIND9 (CVE-2015-5477), the oldest and most widely deployed software used by domain name servers for translating common domain names into specific IP addresses. The vulnerability could allow an attacker to crash large portions of the Web with simple to craft malformed packets …
3
Add a comment...

Norse

Shared publicly  - 
 
41304 There has been an identified need to share Cyber Intelligence. The history of the discussion dates back a number of years and the actual timeline is out of the scope of this study. However, it is important to understand that the need for sharing this type of information is so that it ultimately becomes actionable and applied. It is not difficult for an individual to …
5
1
Roman Mednitzer's profile photo
Add a comment...

Norse

Shared publicly  - 
 
0000 A portion of the Department of Defence’s nonclassified email network used by Army General Martin Dempsey and other members of the U.S. military’s Joint Staff has been shuttered after “suspicious activity” was detected on the systems over the weekend. “We continue to identify and mitigate cybersecurity risks across our networks,” Lieutenant Colonel Valerie Henderson said. “With those goals in mind, we have taken the …
3
1
Eric Criens's profile photo
Add a comment...

Norse

Shared publicly  - 
 
1616129 People much smarter than me once said, “great defense requires understanding the enemy.” And man, that sounds wise as hell! That’s like long bearded dude on a mountaintop type of wise. And so we run with that and turn it into a training class, just like someone turned the profound wisdom of “there’s plenty more fish in the sea” into a fishing class. But …
3
Add a comment...
Have them in circles
1,825 people
Denver Davido's profile photo
Saimom Ilibio do Livramento's profile photo
ryugen tanouchi's profile photo
Tony Maggio's profile photo
Edison Awards's profile photo
William Oberle's profile photo
Oscar da Silva Rocha's profile photo
Francisco Hilario's profile photo
Yoyo Chen's profile photo

Norse

Shared publicly  - 
 
0000 The Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), has issued an advisory regarding a widespread distributed denial of service (DDoS) extortion campaign targeting U.S. companies. IC3 says it has received an growing number of complaints from businesses reporting they have been the target of emails which threaten a DDoS attack against the...
5
Add a comment...

Norse

Shared publicly  - 
 
0000 Following a definitively negative response from an array of stakeholders during a public comment period, the U.S. Department of Commerce has decided to rewrite aspects of a proposal for expanding regulatory control over the export of hacking instruments like malware and zero-day exploits. The original proposal would have made newly added listings in the 2013 amendments for controlled items in the Wassenaar Arrangement (WA) part of U.S. law. ...
2
Add a comment...

Norse

Shared publicly  - 
 
0000 Army General Frank J. Grass, National Guard Bureau Chief and member of the Joint Chiefs of Staff, announced plans to form the National Guard Cyber Protection Team, which will establish a cyber defense capability in each of the ten multi-state Federal Emergency Management Agency (FEMA) regions. The long term goal will be to have the Guard establish cyber capabilities across the nation where key industries and universities can partner to suppo...
4
Add a comment...

Norse

Shared publicly  - 
 
0000 In the wake of substantial data breaches at the Office of Personal Management (OPM), the IRS, and the State Department, a new survey reveals that the majority of U.S. citizens believe the government should take action against foreign nations believed to have beeen involved in an attack. The study, conducted by Vormetric and Wakefield, found that fully 92% of respondents feel the government should initiate some …
3
Add a comment...

Norse

Shared publicly  - 
 
0000 The Department of Homeland Security (DHS) announced they will transition governance of the STIX , TAXII and CybOX automated threat information sharing specifications to an international open standards process through the Organization for the Advancement of Structured Information Standards (OASIS). TAXI (Trusted Automated eXchange of Indicator Information) was designed to define the standard set of services and information exchange mechanisms...
3
2
Uncle Thomas's profile photoGabriel Sfestarof's profile photo
Add a comment...

Norse

Shared publicly  - 
 
0000 German security researcher Benjamin Kunz Meyri, the founder of Vulnerability Lab, has disclosed a critical zero-day vulnerability in the Apple iTunes and AppStore platforms which allows the hijacking of shopping sessions to acquire applications, music, or movies while fraudulently charging the purchase to a targeted account holder. The Filter Bypass and Persistent Invoice Vulnerability allows a remote attacker to inject malicious script into...
3
2
飛鳥凛's profile photoMauro Ruscelli's profile photo
Add a comment...
People
Have them in circles
1,825 people
Denver Davido's profile photo
Saimom Ilibio do Livramento's profile photo
ryugen tanouchi's profile photo
Tony Maggio's profile photo
Edison Awards's profile photo
William Oberle's profile photo
Oscar da Silva Rocha's profile photo
Francisco Hilario's profile photo
Yoyo Chen's profile photo
Contact Information
Contact info
Phone
650.513.2881
Address
1825 South Grant Street, Suite 635 San Mateo, CA 94402
Story
Tagline
Live Attack and Threat Intelligence Solutions
Introduction
Norse is the global leader in live attack intelligence. Norse delivers continuously-updated and unique intelligence that helps organizations detect and block attacks – especially from the darknets - that other systems miss. The superior Norse DarkMatter™ platform detects new threats and tags nascent hazards long before they’re spotted by traditional “threat intelligence” tools.