Interactive Demo
The AlienVault Blogs: Taking On Today’s Threats

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS


Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS


Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS


Perspectives on trends and industry happenings.

Subscribe: Via Email | RSS

AlienVault sponsored and attended SpiceWorld once again. The event was phenomenal on all fronts from learning about new updates within the Spiceworks dashboard to meeting new Spiceheads at the event to sessions and of course, the amazing networking opportunities and parties. There was never a dull moment at the event. Our team had a great time serving up cosmic cocktails… Read more

Posted in:
Tags: spiceworks

Posted in Blog: Labs Blog

Yesterday, a new vulnerability affecting Bash (CVE-2014-6271) was published. The new vulnerability allows attackers to execute arbitrary commands formatting an environmental variable using a specific format. It affects Bash (the Bourne Again SHell), the default command shell for Linux and other UNIX flavors inlcuding Mac OS X. The vulnerability is critical since it can be exposed on web servers… Read more

Posted in:
Tags: botnet, exploit, irc, cve-2014-6721, bash

Six years ago I wrote a blog “My Favorite Color is Three.” It’s kind of sad - the situation with online applications using security questions for resetting your passwords, or Self Service Password Reset (SSPR) is still a horrific mess – really not that much better than it was six years ago. It’s just… Read more

Posted in:
Tags: brute force attack, strong authentication

SANS conducted a survey in June, Higher Education: Open and Secure?, where they surveyed almost 300 IT professionals in Higher Education. Based on the results, Higher Ed institutions clearly have information security concerns and priorities that are a bit different from those of the typical enterprise. You really can't "lock down" Higher Ed: the whole premise of higher education involves… Read more

Posted in:
Tags: sans, survey, higher education

Posted in Blog: Labs Blog

We have previously described how Exploit Kits are some of the favorite techniques used by cybercriminals to install malicious software on victims' systems. The number of Exploit Kits available has experienced exponential growth in the last few years. Since Blackhole’s author was arrested in 2013, the number of Exploit Kits has increased - including Neutrino, Magnitude, Nuclear, Rig and… Read more

Posted in:
Tags: malware, internet explorer, exploit, exploit kit

Get Email Updates

Labs Research
Security Essentials
Industry Insights
All Blogs

Get Security Visibility & Actionable Intelligence.

Featured Content