March 6, 2019 | Chris Doman

Internet of Termites

Termite is a tool used to connect together chains of machines on a network. You can run Termite on a surprising number of platforms including mobile devices, routers, servers and desktops.That means it can be used used to bounce a connection between multiple machines, to maintain a connection that otherwise wouldn’t be possible:Termite is a useful…

March 6, 2019 | Bindu Sundaresan

6 Reasons you Should Consider an Annual Penetration Testing Especially in Healthcare

Breaches are widely observed in the healthcare sector and can be caused by many different types of incidents, including credential-stealing malware, an insider who either purposefully or accidentally discloses patient data, or lost laptops or other devices. Personal Health Information (PHI) is more valuable on the black market than credit card credentials or regular Personally Identifiable Information (PII)..With instances…

Get the latest security news in your inbox.

Subscribe via Email

March 5, 2019 | Javier Ruiz

Mapping TrickBot and RevengeRAT with MITRE ATT&CK and AlienVault USM Anywhere

MITRE ATT&CK™ (Adversarial Tactics, Techniques and Common Knowledge) is a framework for understanding attackers’ behaviors and actions.We are pleased to announce that AlienVault USM Anywhere and Open Threat Exchange (OTX)  now include MITRE ATT&CK™ information. By mapping alarms to their corresponding ATT&CK techniques,…

February 27, 2019 | Sacha Dawes

What is File Integrity Monitoring and Why You Need It

The news is rife with stories of successful attacks against servers, point-of-sale (POS) systems, IoT devices and more where an attacker has gained access to an organization’s IT assets and changed or inserted new files and data to do something malicious. Just a search on malware highlights a seemingly-endless list of variants including the recent exposure of NSA-backed…

February 26, 2019 | Barmak Meftah

AT&T Cybersecurity Is Born

Today marks another new milestone and I am proud to unveil our new name….AlienVault has now combined with AT&T Cybersecurity Consulting and AT&T Managed Security Services to form a new standalone division, AT&T Cybersecurity!Digitalization continues to drive rapid changes in business models and network architectures. On the other hand, it also…

February 25, 2019 | Devin Morrissey

Why Cybersecurity Experts Are Being Recruited Left and Right

Once upon a time, businesses needed to take light cybersecurity precautions to ward off amateur hackers. A business owner may have recruited their tech-savvy nephew to protect their system, barely worrying about the risk. Today, the world of cybersecurity has done a 180 — it’s now a top concern for businesses. As businesses swiftly adapt to the changing digital…

February 22, 2019 | Javvad Malik

Things I Hearted This Week, 22 Feb 2019

We have two weeks of news to catch up with because I was travelling last week and wasn’t able to submit to the editor in time.But that just means double the security fun. So let’s just jump right into it.Helping The Smaller BusinessesSmall and mid-sized businesses have most of the same cybersecurity concerns…

February 21, 2019 | Kate Brew

Fileless Malware Detection: A Crash Course

Given you’re here, you’re likely new to this topic, so please be aware in that fileless malware, fileless malware attack, and fileless attack are different words for the same thing. With that clear, let’s jump in! What is Fileless Malware and How Does It Work?There are many definitions of a fileless malware…

February 20, 2019 | Javvad Malik

Securing People

Cybersecurity has three pillars of people, process, and technology. Enterprises have historically had a skewed focus towards the technology aspect of cyber security - installing another endpoint agent, or deploying another network monitoring device designed to seek out anomalys behaviour.While all these things are well and good, when you look at user awareness plans, and most companies have a…

February 19, 2019 | Jeff Thompson

How to Prevent DNS Poisoning and Spoofing in 2019

DNS "spoofing" and "poisoning". Simply the name conjures up the kind of thoughts that keep network admins up at night. What if my RNDC key gets leaked? Could there be a rogue DHCP server within my perimeter? Are the Lizard Squad planning an attack on  for Christmas?Much of what we know now about DNS, address protocol, and packet…

February 10, 2019 | Kim Crawley

What is Distributed Denial of Service and What do DDoS Attacks look like?

Your favorite website goes offline. That firewall in your office network isn’t filtering anything and is overwhelming the server machines that it is connected to. If an LDAP port is hit by a DDoS attack, you have no Active Directory securing the user accounts on your Windows client PCs. Maybe an IMAP server was hit,…

Watch a Demo ›
Get Price Free Trial