Tag Archives: Logs

CYBERFORCE Profile Series: Transforming Technical Conversations with a Best Practice Assessment

Palo Alto - CYBERFORCE

This is the first in a series of blogs featuring a Palo Alto Networks CYBERFORCE Engineer and the business challenges they tackle. CYBERFORCE recognizes the best-of-the-best from the NextWave Partner Community; proven partner engineers who put the customer first, are trusted for their security expertise, and focus on preventing successful …

Read More »

HIDDEN COBRA – FASTCash Campaign targeting banks

This graphic illustrates the way HIDDEN COBRA actors use compromised switch application servers to approve financial transactions

Since at least late 2016, HIDDEN COBRA actors have used FASTCash tactics to target banks in Africa and Asia. At the time of this TA’s publication, the U.S. Government has not confirmed any FASTCash incidents affecting institutions within the United States. FASTCash schemes remotely compromise payment switch application servers within …

Read More »

Using Rigorous Credential Control to Mitigate Trusted Network Exploitation

Advanced Persistent Threat Activity Exploiting Managed Service Providers

Recommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent the initial attack vectors and the spread of malicious activity, there is no single proven threat response. Using a defense-in-depth …

Read More »

Advanced Persistent Threat Activity Exploiting Managed Service Providers

Advanced Persistent Threat Activity Exploiting Managed Service Providers

Organizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s ability to rapidly respond to and recover from an incident begins with the development of an incident response capability. An …

Read More »

Privacy Policy on Cookies Usage

Some services used in this site uses cookies to tailor user experience or to show ads.