Recommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent …
Firewall
-
MonitoringNetwork TrafficPasswordScanningSecuritySoundUS-CertVirtual Private Network (VPN)
Advanced Persistent Threat Activity Exploiting Managed Service Providers
by blackMOREby blackMOREOrganizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s …
-
OthersSecurity
SSL Decryption Series: The Security Impact of HTTPS Interception
by blackMOREby blackMORE Encrypted internet traffic is on an explosive upturn. According to the Google® Transparency Report: “Users load more than half of the pages they view over HTTPS and spend two-thirds of …
-
AMDHackingLinuxMetasploitMonitoringNetwork TrafficPasswordSecurityShell ScriptUS-CertWindowsWireshark
Publicly Available Tools Seen in Cyber Incidents Worldwide
by blackMOREby blackMORERemote Access Trojan: JBiFrost First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A …
-
BrowserDatabaseHackingMonitoringOthersPasswordScanningSecuritySecurity SoftwareSpam
Catching bad guys
by blackMOREby blackMOREEver wondered how the good guys catch bad guys? I meant to say, what’s the process of catching bad guys who create virus, malware, crypto-lockers? It’s sort of a grey …