Organizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s …
Tag:
Traffic
-
Security Related
SSL Decryption Series: The Security Impact of HTTPS Interception
by blackMOREOpsby blackMOREOpsEncrypted internet traffic is on an explosive upturn. According to the Google® Transparency Report: “Users load more than half of the pages they view over HTTPS and spend two-thirds of …
-
Command Line Interface (CLI)HackingHow toKali LinuxLinuxSecurity RelatedWindows
Publicly Available Tools Seen in Cyber Incidents Worldwide
by blackMOREOpsby blackMOREOpsFirst observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A RAT is a program …
-
Ever wondered how the good guys catch bad guys? I meant to say, what’s the process of catching bad guys who create virus, malware, crypto-lockers? It’s sort of a grey …
Older Posts