Interactive Demo
The AlienVault Blogs: Taking On Today’s Threats
Latest

The most recent posts from across the AlienVault blogs.

Labs

Late-breaking discoveries and in-depth analysis.

How-To

Practical, how-to advice, tips and guidance.

Hot

Perspectives on trends and industry happenings.

Posted in Blog: Labs Blog

We have previously described how Exploit Kits are some of the favorite techniques used by cybercriminals to install malicious software on victims' systems. The number of Exploit Kits available has experienced exponential growth in the last few years. Since Blackhole’s author was arrested in 2013, the number of Exploit Kits has increased - including Neutrino, Magnitude, Nuclear, Rig and… Read more

Posted in:
Tags: malware, internet explorer, exploit, exploit kit

Posted in Blog: Labs Blog

A few days ago we detected a watering hole campaign in a website owned by one big industrial company. The website is related to software used for simulation and system engineering in a wide range of industries, including automotive, aerospace, and manufacturing. The attackers were able to compromise the website and include code that loaded a… Read more

Posted in:
Tags: scanbox, watering hole

Posted in Blog: Labs Blog

During the last few years we have seen an increase on the number of malicious actors using tricks and browser vulnerabilities to enumerate the software that is running on the victim’s system using Internet Explorer. In this blog post we will describe some of the techniques that attackers are using to perform reconnaisance that gives them information for… Read more

Posted in:
Tags: sykipot, internet explorer, waterhole, vulnerabilities, detecting endpoint software, angler exploit kit

Posted in Blog: Labs Blog

Every single day our automated systems analyze hundreds of thousands of malicious samples. Yesterday one of the samples caught my attention because the malware started performing bruteforce attacks against Remote Desktop using certain username and passwords. MD5: c1fab4a0b7f4404baf8eab4d58b1f821 Other similar samples: c0c1f1a69a1b59c6f2dab1813… Read more

Posted in:
Tags: credit cards, pci, point of sale, pos

Posted in Blog: Labs Blog

Let’s briefly review what we accomplished in the first post: Understood the capabilities and design of MIDAS Deployed MIDAS on a Mac OS X endpoint installed the MIDAS plugin in AlienVault USM Verified the integration by running MIDAS and confirming the events in the SIEM How does this make us safer? More generally, what does this mean? To… Read more

Posted in:
Tags: ossim, alienvault, macosx, plugins, siem, apple, midas, mac, plist