NotPetya Technical Analysis
In our Detecting Petya/NotPetya post, we described the way in which NotPetya (or “Nyetna” as it has also been named) spreads to other systems on the network without use of the ETERNALBLUE/ETERNALROMANCE SMBv1 exploits. (Although the code contains the ability…
Read More
June 30, 2017
Deploying NetMon Freemium at Home to Monitor IoT Devices
Why Monitor IoT Devices at Home? LogRhythm’s NetMon Freemium is a powerful and easy-to-use product, so why not fully realize its potential both at home and in the office? In-home Internet of Things (IoT) devices, such as sensors, lights, cameras,…
Read More
June 29, 2017
Winner! Winner! Black Hat Dinner!
We’re pleased to announce we have a winner for our “Win a Trip to Black Hat” contest. Thank you to the several hundred who entered. Over 200 of you passed the test! Curious to see how you may have fared…
Read More
June 27, 2017
Using Deep Packet Analytics to Extract Specific Bytes
Why Extract Specific Bytes Out of a Packet? Pulling specific bytes out of a packet is the best way to get to the real truth of the content. Getting to this level of the content can help you in many…
Read More
June 27, 2017
Detecting Petya/NotPetya Ransomware
Posted by: LogRhythm Labs
Petya / NotPetya Poses Risk to Even Patched Systems On the morning of June 27, 2017, a new ransomware outbreak—similar to the recent WannaCry malware—was discovered in the Ukraine. The malware quickly spread across Europe, affecting varied industries such as…
Read More
June 27, 2017
PCI-DSS Compliance 3.2 Updates
Posted by: LogRhythm Labs
Whether you swipe it, chip it, tap it, or phone it in, if you are involved in capturing payments from a credit card, you are most likely required to comply with Payment Card Industry Data Security Standard (PCI-DSS) requirements. PCI-DSS…
Read More
June 20, 2017