NetMon: Quick Tips and Use Cases
When attackers are trying to break through your perimeter or are operating within your environment, you need to act quickly. Security intelligence is paramount. The good news is that you can detect most indicators of a threat from within the…
Read More
March 6, 2015
FREAK: Organizations Need to Protect Themselves, Not Wait for Patches
This week, security researchers at SmackTLS, a new, potentially dangerous flaw that could allow hackers to trick Internet-enabled devices into using weak encryption. The bug, dubbed “FREAK” (factoring attack on RSA export keys). affects SSL/TLS protocols and could, therefore, be…
Read More
March 6, 2015
TalkTalk Customer Data Breached
Last week it was revealed that UK telecommunications company TalkTalk suffered a data breach in 2014, where customer details—such as account numbers, names and addresses—were stolen. The stolen details were then used by scammers to trick people into believing they…
Read More
March 2, 2015
Simulated Cyber Threat Thwarted at London’s BT Tower
Earlier this week, a simulated cyber terrorist strike took place at London’s BT Tower. The event—part of the UK government-backed Cyber Security Challenge—was designed to mimic a sophisticated cyber-attack and tested the ability of amateur contestants to defend the building’s…
Read More
February 27, 2015
Armed Forces the Latest to be Warned Against Cyber Attacks
A recent study by Lancaster University, The Future of Maritime Cyber Security, has found that Britain’s aircraft carriers and warships are at risk due to their reliance on ageing software. The research team has warned that the Royal Navy and…
Read More
February 17, 2015
Lights, Case, Action!
LogRhythm released Case Management in its most recent update, and while I could wax lyrical about the merits of why you should be using this feature, I won’t. Instead, I’ll show you a brief video demonstration of the new feature…
Read More
February 13, 2015