Given you’re here, you’re likely new to this topic, so please be aware in that fileless malware, fileless malware attack, and fileless attack are different words for the same thing. With that clear, let’s jump in! What is Fileless Malware and How Does It Work?There are many definitions of a fileless malware…
New infographic! The full report is here.…
Time to look back on the top AlienVault blogs of 2018! Here we go:A North Korean Monero Cryptocurrency Miner by Chris DomanCrypto-currencies could provide a financial lifeline to a country hit hard by sanctions. Therefore it’s not surprising that universities in North Korea have shown a clear interest in cryptocurrencies. Recently the Pyongyang University of Science and…
I got curious about what kind of people are most desired in a Security Operations Center (SOC). I wondered how accepting InfoSec blue teamers would be to having a team member with a great attitude and system administration or network management skills, versus someone with deep InfoSec knowledge and skills. So I did a poll on Twitter to learn more.…
This is the last in our blog series on security awareness to celebrate National Cyber Security Awareness Month (NCSAM). We decided to take on social media sharing tips, and we tapped the Spiceworks community of IT pros for tips and tricks. We made it a contest, with the winner getting a $200 airline voucher. Here is the winning entry:We…
We ran a contest in Spiceworks recently, asking folks for their best cloud tech jokes. Here are some of the funniest ones:Those SpiceHeads sure have great senses of humor, of a highly techie variety! …
In honor of NCSAM, we decided to ask the Twitter community for security travel tips, to help us be more safe when travelling. Here's the original Tweet:Want some AlienVault swag? Send us your top tip for #security while traveling by October 8 for potential inclusion in an upcoming blog. Of the tips we include in the blog, we&rsquo…
At Black Hat 2018, we surveyed attendees on diverse topics ranging from how to react to extortion, what impact the geopolitical landscape is having on the industry, and whether the shiny veneer of the cloud is beginning to fade. Our Security Advocate, Javvad Malik, has put together an excellent report on the survey. The report is based on our…
Carrying on with National Security Cybersecurity Awareness Month (NSCAM), we continue our celebratory blog series. This one is on the dangers the Universal Serial Bus (USB) and other removable media. USBs are called all kinds of things, from thumb drives to memory sticks to USB flash drives.USB’s sure are convenient. They’re tiny and you can…
Well Javvad Malik has created another awesome report taking on what taking security seriously actually looks like - both for customers and providers. Here's a little excerpt:The “we take security seriously” line is the security equivalent of the infamous call center “your call is important to us” line. Everybody says…
Javvad Malik and the rest of the AlienVault team surveyed 928 participants at Infosecurity Europe 2018 on this topic. Read the full report from Javvad here!Key FindingsLooking forward, cloud security threats are the most concerning external threatInternally, phishing (55%) and ransomware (45%) lead the pack of worries for security departments92 percent would rather pay a subscription fee, allow ads, or…
We recently ran a contest on Twitter to collect the best InfoSec memes from the community. First I polled folks from my personal account to gauge interest, and wow was there interest! You know me and I definitely had to do a compedium blog on these funny as well as educational security memes. Since this blog on IT jokes from 2015…