September 18, 2018 | Chuck Brooks

AI and ML; Key Tools in Emerging Cybersecurity Strategy and Investment

Recently, the Defense Advanced Research Project Agency (DARPA) announced a multi-year investment of more than $2 billion in new and existing programs in artificial intelligence called the “AI Next campaign. Agency director, Dr. Steven Walker, explained the implications of the initiative: “we want to explore how machines can acquire human-like communication and reasoning capabilities, with the ability to…

September 17, 2018 | John Alves

People and Passwords

In today's world, the Internet is a vast place filled with websites, services, and other content. Most content along with computers and other technology requires a password. The number of passwords a person has to know continues to grow. While it’s safe to say we use passwords to keep our accounts confidential, they can also be…

Get the latest security news in your inbox.

Subscribe via Email

September 14, 2018 | Javvad Malik

Things I Hearted this Week, 14th September 2018

With everything that keeps going on in the world of security, and the world at large, most eyes were focused on Tim Cook as he and his merry men took to the stage and announce the latest and greatest in Apple technology.There didn’t seem to be anything totally mind-blowing on the phone end. Just looked to be…

September 11, 2018 | Danielle Russell

Explain Cryptojacking to Me

Last year, I wrote that ransomware was the summer anthem of 2017. At the time, it seemed impossible that the onslaught of global ransomware attacks like WannaCry and NotPetya would ever wane. But, I should have known better. Every summertime anthem eventually gets overplayed.This year, cryptojacking took over the airwaves, fueled by volatile global cryptocurrency markets. In the first half…

September 10, 2018 | Pam

VLAN Hopping and Mitigation

We’ll start with a few concepts:VLANA VLAN is used to share the physical network while creating virtual segmentations to divide specific groups. For example, a host on VLAN 1 is separated from any host on VLAN 2. Any packets sent between VLANs must go through a router or other layer 3 devices. Security is one of the many reasons…

September 7, 2018 | Javvad Malik

Things I Hearted this Week, 7th Sept 2018

Welcome to another week of security goodness. I think we’re in that weird part of the year where most summer holidays are coming to a close, so people are opening their inboxes - saying NOPE - and shutting them back down again. Or maybe that’s just me. Although I am glad that the kids are finally…

September 6, 2018 | Javier Ruiz

Malware Analysis using Osquery Part 2

In the first part of this series, we saw how you can use Osquery to analyze and extract valuable information about malware’s behavior. In that post, we followed the activity of the known Emotet loader, popular for distributing banking trojans. Using Osquery, we were able to discover how it infects a system using a malicious Microsoft Office document…

September 5, 2018 | Charles Humphrey

Malware Analysis for Threat Hunting

If you're not into Wireshark, procmon and Windows Sysinternals you might be in the wrong place :) Malware analysis allows the analyst to see what actions are taken and allows us to use those actions to build a profile that can be used to detect and block further infections and find related infections.  We run the malware…

September 4, 2018 | Javvad Malik

Cyber Security Awareness Month - Phishing

It’s September, which means it’s almost October, which is National Cyber Security Awareness Month (NCSAM)!NCSAM was launched by the National Cyber Security Alliance & the U.S. Department of Homeland Security in October 2004. This government and industry collaboration was started with the intention to ensure citizens and companies of all sizes have access to resources…

August 31, 2018 | Javvad Malik

Things I Hearted this Week, 31 Aug 2018

After a week in Vegas for Blackhat, and then a week’s vacation, I’m back with your favourite dose of security roundup. Giving you the security news and views you deserve, not need.So, let’s just jump into it and make up for lost time.Adventures in Vulnerability ReportingDiscovering vulnerabilities and getting rewarded for…

August 30, 2018 | Devin Morrissey

Ethical Hacking: An Update

How has the world of hacking changed over the past decade? More and more companies are hiring ethical hackers to hack systems and show vulnerabilities. Penetration testers try to access systems by any means possible, including through social engineering. Let’s look at what ethical hacking is, how it’s done, and how it will change in the…

August 28, 2018 | Danielle Russell

AlienVault Product Roundup July / August 2018

It’s been a busy summer at AlienVault! Amid some major company announcements, we continue to evolve USM Anywhere and USM Central with new features and capabilities that help you to defend against the latest threats and to streamline your security operations. You can keep up with our regular product releases by reading the release notes in the AlienVault…

Watch a Demo ›
GET PRICE FREE TRIAL CHAT