Organizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s …
Category:
Security
-
-
OthersSecurity
SSL Decryption Series: The Security Impact of HTTPS Interception
by blackMOREby blackMOREEncrypted internet traffic is on an explosive upturn. According to the Google® Transparency Report: “Users load more than half of the pages they view over HTTPS and spend two-thirds of …
-
AMDHackingLinuxMetasploitMonitoringNetwork TrafficPasswordSecurityShell ScriptUS-CertWindowsWireshark
Publicly Available Tools Seen in Cyber Incidents Worldwide
by blackMOREby blackMORERemote Access Trojan: JBiFrost First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A …
-
BrowserHow toNewsOthersSecuritySound
Setting Up A Free TLS/SSL Certificate With “Let’s Encrypt”
by blackMOREby blackMORESSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the …