Top 17 Blogs from ‘17

January 9, 2018 | Kate Brew
X

Get the latest security news in your inbox.

Subscribe via Email

No thanks. Close this now.

It was a great year in blogs for AlienVault! Here are the top blogs from 2017, selected by number of views from all sources. Drumroll please.

  1. Explain Bitcoin to Me by Tristan Johns. It’s an approachable but technical explanation of how Bitcoin works.
  2. MacSpy: OS X RAT as a Service by Peter Ewane. It’s about one of the first malware-as-a-service (MaaS) for OS X.
  3. Configuring Kali Linux on Amazon AWS Cloud for FREE by Irfan Shakeel. If you want to experiment with pentesting without spending money, this blog will let you know how.
  4. How Does Whonix Make Kali Linux Anonymous & How to Prevent It? by Irfan Shakeel. Learn what Whonix is and how it works, and how it can be used to go incognito while using Kali Linux. There’s also info on how to prevent folks from doing in in your corporate network.
  5. Ongoing WannaCry Ransomware Spreading Through SMB Vulnerability by AlienVault Labs. The blog details findings on WannaCry as it started in May 2017.
  6. LockCrypt Ransomware Spreading via RDP Brute-Force Attacks by Chris Doman.
  7. Best Advice for a Career in Cyber Security by Ryan Leatherbury. Ryan discusses networking, conferences, blogs, InfoSec on Twitter, hands-on tools, mentors and more!
  8. It’s Only a Hacker if It’s Linus Himself by Laureen Hudson. At AlienVault, we stick to precisely descriptive terms; we have malicious actors, we have security researchers, but unless we have the fortune to be talking about Linus himself, you’ll never see hackers in our documentation. 
  9. How the Vote Hacking Was Done at DefCon25 by @notpandapants. From a guest blogger who participated. The Diebold ExpressPoll 5000 is a piece of election hardware that is compromised to the core, and creates a hacker-friendly platform for large-scale election manipulation, on multiple fronts. Interesting blog, but a little scary too.
  10. Red Teamers Can Learn Secrets by Purple Teaming by Haydn Johnson. Great guest blog by a practitioner, teaching us why Red Teamers Should “Purple Team it”.
  11. MacronLeaks – A Timeline of Events by Chris Doman. Chris discusses the implications of leaked documents and the 2017 French election.
  12. How to Prepare to Take the OSCP by Blade Soriano. Guest blogger describes how he prepared for and passed the OSCP, with helpful advice to others.
  13. OTX is Now a Free STIX/TAXII Server by Chris Doman. Well the title says it all and I’m getting a little tired of typing Chris Doman J
  14. How Honeypots Work: Things that Go Bump in the Network by Phillip Maddux. Discussion of the open source honeypot HoneyPy. Also includes an explanation of honeypots and applications in network security.
  15. Certified Ethical Hacker (CEH): What It Is, What It Isn’t, and Why It’s Important by Jonathan Gibson. Great advice and sample questions from a guest blogger after attaining CEH.
  16. Beginner’s Guide to Open Source Incident Response Tools and Resources by James Fritz. Describes a wide variety of tools for incident detection, triage, containment and response.
  17. Demystifying Network Isolation and Micro-Segmentation by Alissa Knight. A project management approach to designing, implementing, and operationalizing network isolation and micro-segmentation.
Kate Brew

About the Author: Kate Brew
Kate has over 15 years experience in product management and marketing, primarily in information security.
Read more posts from Kate Brew ›

TAGS: infosec

‹ BACK TO ALL BLOGS

Watch a Demo ›
GET PRICE FREE TRIAL