Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
default-logo
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact
Menu
  • Home
  • About Gregory Evans
  • Credentials
  • In The News
  • Gallery
  • Blog
  • Contact

Malware increasingly using DNS as C&C channel to avoid detection

February 29, 2012 Author: Category: Greg's Blog

The number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 yesterday. There are many channels that attackers use for communicating with their botnets,…

read more

Malware Increasingly Uses DNS as Command and Control Channel to Avoid Detection, Experts Say

February 29, 2012 Author: Category: Greg's Blog

The number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 on Tuesday. There are many channels that attackers use for communicating with their…

read more

(1) MEDIUM: Google Chrome Stable Channel Updates

January 28, 2012 Author: Category: Greg's Blog

Category: Widely Deployed Software Affected: Google Chrome prior to 18.0.1017.2 View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security

read more

11.42.11 IBM AIX Fibre Channel Driver QLogic Local Denial of Service

October 26, 2011 Author: Category: Greg's Blog

CVEs: CVE: CVE-2011-3982 Platform: Aix View full post on @RISK: The Consensus Security Alert View full post on National Cyber Security

read more

Microsoft’s YouTube channel hijacked by previous owner

October 25, 2011 Author: Category: Greg's Blog

Microsoft’s official YouTube channel was hijacked on Saturday and all videos hosted on it were temporarily removed. The hacker replaced them with others claiming that Microsoft is holding a contest. “We are sponsoring” and “Make us a Background to Get Subbox!!!” were the titles of two rogue videos published by…

read more

Posts navigation

Newer posts

Gregory Evans

Evans went on to become a prominent figure in the cybersecurity industry. Drawing from his real-world experiences, he became a sought-after consultant, advising high-profile clients, including top athletes and entertainers, on protecting themselves from cyber blackmail and extortion.

Menu

  • Home
  • About
  • Blog
  • Contact

Quick Links

  • Gallery
  • Credentials
  • In The News
  • Speaking Engagements

Contact Info

  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
  • Lorem Ipsum is simply dummy text
Facebook Twitter Youtube

© Copyright 2024 All Rights Reserved