The first variant discovered by Jakub is called PayDOS and is a batch file converted into a executable. When run, the executable will extract the batch file into the %Temp% folder and run it from there. Once executed, batch file will scan certain folders for certain file extensions and rename the file so that one letter […]
Author: jermsmit
https://blogs.office.com/2016/11/02/introducing-microsoft-teams-the-chat-based-workspace-in-office-365/
Recently I had a chance to get my hands on this excellent Firewall by Checkpoint. And as you know not everything goes perfectly, and this is where you get a chance to learn how it works, while you fix. I encountered an issue where one of the Threat Prevention Blades was stuck in updating mode […]
The following is a quick video of the setup of a Checkpoint 600 Security Appliance Notes right from the admin guide: http://downloads.checkpoint.com/dc/download.htm?ID=24000 Check Point 600 Appliance Overview Check Point 600 Appliance delivers integrated unified threat management to protect your organization from today’s emerging threats. Based on proven Check Point security technologies such as Stateful Inspection, […]
Capture PuTTY Session Logs
In the past week I have had my good share of working on remote systems where I needed to utilize the tool PuTTY to issue commands; not all of them documented. To assist me in documenting my steps I often use the session logs. However this normal has been a manual process in the heat of […]
IT Security Seminar with FBI Cyber Division
Yesterday I attended a joined seminar with Virtuit Systems & FBI Cyber Division. Focal areas: Ransomeware and Zero-Day Attacks and How to fight against them Opening with a one (1) hour discussion: Guest Speaker: Philip Frim, Supervisory Special Agent with the FBI’s Newark Division. Topics Development of FBI’s Cyber Division Program Computer Analysis and Response […]