AlienVault Security Essentials
The AlienVault Blogs
Taking On Today’s Threats

Yes, it’s that time of the week where we look back over what’s been happening in the world of security over the past week.Pinning down locations from photosGreat example of how one can look at clues in a photo and combine with a bit of OSINT and Google maps to determine the location of… Read more

Tags: infosec, infosec news, week-in-review

Today, 76% of organizations have adopted or are planning to adopt cloud services, including cloud storage. Amazon Web Services (AWS) is the public cloud market leader with 40% cloud market share. Its Simple Storage Service (Amazon S3) is one of its most popular services, used by nearly 195,000 unique domains.Amazon S3 is probably one of the most popular services, especially among those… Read more

Tags: file integrity monitoring, fim, amazon, s3

To carry out attacks, malware and botnets rely on communication with a Command & Control server (C&C or C2) to receive instructions. As a result, today’s security tools have become extremely adept at detecting traffic to and from malicious IP addresses. When a system or device starts talking to a malicious IP or domain, alarms sound… Read more

Tags: malware, rat, remote access trojan, rokrat

Internet fraud is one of the most common motivators of cybercrime. Millions of dollars are stolen every year from victims who are tricked into initiating wire transfer payments through social engineering tactics and computer breaches. This is typically accomplished using one of three methods: business email compromise (BEC), email account compromise (EAC), and spoofing.All three of these methods can… Read more

Tags: social engineering, fraud, email account compromise, business email compromise, bec, spoofing, eac

Photo credit: wdstockDoes this scenario look familiar to you?Monday – “Roll up your sleeves, people! We’re going to patch some security vulnerabilities this week! I can FEEL it!”Tuesday – “Reports are sent out and tickets have been created. They can’t ignore all those Highs and Critical CVEs THIS time!” … Read more

Tags: vulnerability, infosec, vulnerability management, vulnerability management program

Get the latest
security news in
your inbox.

Subscribe via Email

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content