Organizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s …
Tag:
Traffic
-
OthersSecurity
SSL Decryption Series: The Security Impact of HTTPS Interception
by blackMOREby blackMORE Encrypted internet traffic is on an explosive upturn. According to the Google® Transparency Report: “Users load more than half of the pages they view over HTTPS and spend two-thirds of …
-
AMDHackingLinuxMetasploitMonitoringNetwork TrafficPasswordSecurityShell ScriptUS-CertWindowsWireshark
Publicly Available Tools Seen in Cyber Incidents Worldwide
by blackMOREby blackMORERemote Access Trojan: JBiFrost First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A …
-
BrowserDatabaseHackingMonitoringOthersPasswordScanningSecuritySecurity SoftwareSpam
Catching bad guys
by blackMOREby blackMOREEver wondered how the good guys catch bad guys? I meant to say, what’s the process of catching bad guys who create virus, malware, crypto-lockers? It’s sort of a grey …
Older Posts