Linux Servers Can Get Malware Too

    Yes it is a big deal, since many IT folks do not know that malware is on all computers, Malware is short for malicious software and is typically “installed” in Windows machines  with a phishing email, but what makes this unique is not just the Linux system attacks, but how they got attacked. … Read more

Targeted Attacks on the Rise

Increasing attacks on networks are targeted attacking specific industries. The  focus is on the wording, malware, spam, and click baits. This makes sense since if the easiest attacks are against users and the attacker depends on people either clicking on spam email or clicking on some website link that is laced with malware.  The malware … Read more

Vulnerabilities Can Be Exploited

(Sunday reflections and current news) Specifically the Seagate NAS  Business Storage Line Today’s Internet Storm Center has the story. This is the method the attackers can use to hack the devices(From ISC): “It appears to be trivial to exploit the devices and a metasploit module and an exploit are publicly available.” PII(Personally Identified Information) was bought … Read more

Command & Control Traffic From Inside Network

It seems everyone should be looking for Command and Control traffic  from inside the network (updated on 04/01/2016)   What does Command and Control mean? It is the last process in the hacking cycle: As we have pointed out: SVAPE & C   Scan, Vulnerability Analysis, Penetrate Exploit & Control from other posts  http://www.fixvirus.com/svapec/ Our … Read more