October 30, 2018 | Julia Kisielius

AlienVault Open Threat Exchange Hits Major Milestone with 100,000 Participants

Today, I’m excited to announce that AlienVault® Open Threat Exchange® (OTX™) has grown to 100,000 global participants, representing 36% percent year-over-year growth. AlienVault OTX, launched in 2012, is the world’s first free threat intelligence community that enables real-time collaboration between security researchers and IT security practitioners from around the world. Every day, participants  from…

October 29, 2018 | James Quinn

MadoMiner Part 2 - Mask

This is a guest post by independent security researcher James Quinn.      If you have not yet read the first part of the MadoMiner analysis, please do so now.  This analysis will pick up where Part 1 left off, while also including  a brief correction.  The x64 version of the Install module was…

Get the latest security news in your inbox.

Subscribe via Email

October 29, 2018 | Javvad Malik

Spicing up the MSSP World

We love conducting  surveys at conferences. Not only do we gain insights from some of the smartest people in attendance, but we get a few extra minutes to mingle and get to know them better.So, while we were at SpiceWorld in Austin this year, we sought to capture thoughts on outsourcing security. Of the attendees, 380 participated in our…

October 26, 2018 | Javvad Malik

Things I Hearted this Week, 26th October 2018

Wordpress Wants to Erase its PastI was just flexing my clickbait title muscles with the heading here. But according to a talk at DerbyCon, the WordPress security team stated its biggest battle is not against hackers but its own users, millions of which continue to run sites on older versions of the CMS, and who regularly fail to apply…

October 25, 2018 | Kate Brew

NCSAM Finale: Social Media Sharing Tips

This is the last in our blog series on security awareness to celebrate National Cyber Security Awareness Month (NCSAM). We decided to take on social media sharing tips, and we tapped the Spiceworks community of IT pros for tips and tricks. We made it a contest, with the winner getting a $200 airline voucher. Here is the winning entry:We…

October 24, 2018 | Maddie Davis

The Importance of Patch Management

With each passing year, our world becomes more and more digital. Our social interactions and personal data as well as many of our jobs are based primarily on the internet. Although this shift has come with great benefits, it’s also opened us up to a heightened threat of cyber terrorism. 2017 saw some of the most devastating high-profile attacks…

October 23, 2018 | Javvad Malik

Why Spending More On Security Isn’t The Answer

Volume 8 of the AT&T Cyber Insights report looked into whether organizations who are investing more in cybersecurity are achieving better outcomes than those who aren’t.The outcome of the research was a resounding no.On the surface, this may seem counter-productive. After all, how many CISO’s have you ever heard complain about having too…

October 22, 2018 | TheBestVPN Team

How to Defend Your IoT Devices from IoT Botnets

The Internet of Things (IoT) is changing how the world works. Machine to machine (M2M) communication simply makes for faster, more timely, and transparent connections, thereby saving us a lot of time and money.This means that your doctor no longer has to wait a few hours to receive your heart monitor readings when it automatically transmits such…

October 19, 2018 | Javvad Malik

Things I Hearted this Week, 19th October 2018

It’s been another eventful week in the world of cyber security. So let’s just jump right into it.NCSC has Been BusyNCSC collaborated with Australia, Canada, New Zealand, UK, and the USA to give us a report that highlights which publicly-available tools criminals are using to aid their cyber crimes.Joint report on publicly available…

October 18, 2018 | Jose Manuel Martin

Detecting Empire with USM Anywhere

Empire is an open source post-exploitation framework that acts as a capable backdoor on infected systems.  It provides a management platform for infected machines. Empire can deploy PowerShell and Python agents to infect both Windows and Linux systems.Empire can:Deploy fileless agents to perform command and control. Exploit vulnerabilities to escalate privileges. Install itself for persistence. Steal user…

October 17, 2018 | Kate Brew

Best Cloud Tech Jokes and Memes

We ran a contest in Spiceworks recently, asking folks for their best cloud tech jokes. Here are some of the funniest ones:Those SpiceHeads sure have great senses of humor, of a highly techie variety! …

October 16, 2018 | Javvad Malik

AT&T Business Summit 2018 - First Impressions and Recap

From the 25th to the 28th of September 2018, I had the opportunity to attend the AT&T Business Summit in Dallas.I walked away with a whole new perspective on AT&T business, what a conference could be like, and the Dallas Cowboys.The Future is HereThe show floor at the summit was small when compared to…

Watch a Demo ›
GET PRICE FREE TRIAL