The Impact of NotPetya and WannaCry

December 11, 2017 | Javvad Malik
December 11, 2017 | Javvad Malik

The Impact of NotPetya and WannaCry

Another wake up callEvery time there is a major security incident many people claim it to be the “wake up call” the incident has needed. Surely, it stands to reason that if a big enough incident occurs, people will stand up, take notice, and take the necessary steps needed to make sure it doesn’t happen…

December 8, 2017 | Javvad Malik

Things I Hearted this Week – 8th December 2017

I’ve been spending a couple of days this week at the SANS EU Security awareness summit which has featured some exceptionally good speakers. Dr. Jessica Barker was the opening keynote and made some great points about optimism and how positive reinforcement is a far better motivator in security than the usual negativity.As I’m one that…

Get the latest security news in your inbox.

Subscribe via Email

December 7, 2017 | Javvad Malik

Six Cybersecurity Predictions for The Year Ahead

Cloud computing, ransomware, IoT, GDPR and technology politics poised to make a significant impact on the world of security in 2018It’s that time of the year again – the time for us to start gazing into crystal balls, pulling out the ouija board, and taking a DeLorean up to 88 miles per hour, all in an attempt to predict…

December 5, 2017 | Andrew Lowe

AlienVault Now Using HackerOne for Responsible Vulnerability Reporting

One of the issues I’ve seen in companies is the idea that we can do it all, on our own, when it comes to security. One underlying issue is nasty vulnerabilities on company websites. We can test all day every day for vulnerabilities, but it’s similar to when an author writes and attempts to edit his…

December 4, 2017 | Kim Crawley

Explain How VPN Works

The recently discovered KRACK vulnerabilities affecting WPA2 have encouraged people to talk about the benefits of Virtual Private Networks. I think that's great! Ideally, we should all be using VPNs at home, in the office, during your commute, over Wi-Fi, and over Ethernet. But in order to use VPNs, it helps to understand how they work and how they…

December 1, 2017 | Javvad Malik

Things I Hearted this Week – 1st December 2017

Welcome back after a week’s hiatus to give people time to be thankful for all the good in their life. The best things in life: SIEM and log management, crowd-based threat intelligence, vulnerability assessment, asset discovery, and intrusion detection.I am RootApple found itself in the headlines as it was revealed that anyone could log in with…

November 30, 2017 | Kim Crawley

In Honor of Computer Security Day, Let’s Celebrate the Evolution of SIEM!

It’s the most wonderful time of the year. The trees on my street have almost completely shed their leaves. My neighbors are stringing multicolored lights on their houses. My local shopping mall has started to play various versions of “Jingle Bell Rock,” recorded by many of the stars of top 40 on radio from the past few…

November 28, 2017 | Kate Brew

6 Animals Associated with Red Team

Sure, we've had some interesting, educational and factual blogs about Red Teaming in the past, such as:Red Teamers Can Learn Secrets by Purple Teaming Red teams; a diary from the garden of Red versus Blue Be a Red Teamer to be a Better Blue Teamer: Pen Testing ala Jayson StreetRed teamers are a proud lot. They particularly…

November 27, 2017 | Michelangelo Sidagni

2017 NopSec State of Vulnerability Risk Management Report

With the turning of the leaves and the first cold fall nights, usually at NopSec it means that the 2017 edition of our annual State of Vulnerability Risk Management Report is due. This year we are particularly excited because we collaborated with the exploration of a potential threat intelligence source and also our partnership with the AlienVault Labs Security Research Team…

November 24, 2017 | Javvad Malik

5 Retail Security Tips: Don’t Let Hackers Ruin the Holiday Season

While many people will be kicking off their holiday shopping this weekend to take advantage of brick-and-mortar or online deals, unsavory hackers will be working on gaining access to consumers’ personal information through retailers for malicious purposes.Retailers are often targeted during these peak trading periods when it may be easier for criminals to hide their actions in the…

November 22, 2017 | Javvad Malik

Jeremiah Grossman: On InfoSec Basics, Incentives, and Warranties

For anyone that's worked in information security for any period, Jeremiah Grossman is a familiar name. Having worked in security for two decades he's seen many industry cycles come and go.Not content with simply being a professional hacker, highly acclaimed public speaker, published author, founder of WhiteHat Security, and current Chief of Security Strategy for endpoint security…

November 21, 2017 | Kanika Sharma

Keystroke Logging - How it Affects the Online Privacy of Internet Users

Besides being a useful tool to study human-computer interaction, keystroke logging or keylogging is one of the most dangerous cyber threats for online users. Designed to covertly log everything a user types using the keyboard, keyloggers can silently steal and pass on your sensitive information to cybercriminals. Not just the websites you browse or the queries you google on, but…

Watch a Demo ›