Threat Hunting in Your Network
We should hunt for threats in our network – i.e. find possible attacks in our network to see what is being attacked and whether we can start to counter the…
Defend Your Systems
We should hunt for threats in our network – i.e. find possible attacks in our network to see what is being attacked and whether we can start to counter the…
What kind of bad things are going on today on the Internet? Have you heard of formjacking, cryptojacking, and ransomware? Formjacking is where a retailer’s credit card “form” was hacked…
There are quite a few Google projects of which some are focused on security(there are many more projects, but these are the ones that could be cybersecurity. The explanation which…
As we have mentioned before the cycle of bugs found to patches released can sometimes be long. Tavis Ormandy has disclosed this bug in Microsoft Windows’ SymCrypt. Which can cause…
Internet Storm Center discusses an attack by the ‘GoldBrute’ botnet They found 1.5mil servers being used by the botnet. This means that a weakness in Microsoft (CVE-2019-0708) May 14 Customer…