Top of Page
In this report, we list the key security topics in 2019 that our SOC was focused on and look at three notabletypes of activity revealed by the Data Analytics Platform: information leaks via Elasticsearch servers, DDoS attacks, and Emotet.
The report follows on from the forensic memory imaging discussion in Vol.45.In that edition, we looked at acquiring memory images on Linux.
The report looks at the IIJ Innovation Institute’s research into binary program analysis technology that requires no special assumptions to be made about the program being analyzed.
End of the page.