Inspection and Sanitization Guidance for Moving Picture Experts Group Standards (MPEG-W with H.264/Advanced Video Coding (AVC))
MPEG-2 is a standard for the generic coding of moving pictures and associated audio information. It describes a combination of lossy compression methods for storage and transmission of audio and video using available storage media and transmission bandwidth. It includes...
30 January 2018 87 page(s) pdf
Defending Against the Malicious Use of Admin Tools: PowerShell™
Malicious actors are using our own tools against us. Why reinvent the wheel or drop something new, something distinguishable, when the tools used on every network every day will provide you all you need? This paper provides a strategy for...
10 November 2016 10 page(s) pdf
Defensive Best Practices for Destructive Malware
It is reasonable to expect that organizations, ranging from military to government to industry, will experience an increased threat from destructive malware.
21 January 2015 5 page(s) pdf
Long-Lived Hashes for AD Smartcard Required Accounts
It is well-known that passwords and their hashes can often be copied and reused by malicious cyber actors. Requiring smartcards or other hard tokens enables stronger authentication because they cannot be copied. Such a token can used by an adversary...
22 November 2016 2 page(s) pdf
Power Shell: Security Risks and Defenses
This document is in response to the Technical Report "Defending Against the Malicious Use of Admin Tools: Powershell™ CTR-U-OO802243-16. This paper provides a strategy for hardening, defending, and detecting anomalous and malicious use of administrator tool sets.
01 December 2016 2 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-6 of 6 results returned for: "keywords:"Malicious Actor""