Search Results

Search results for "backdoor"

Juniper ScreenOS Backdoor Eavesdropping - AlienVault

https://www.alienvault.com/.../security-essentials/juniper-screenos-backdoor-eavesdropping

Nobody likes eavesdroppers, ESPECIALLY when the eavesdroppers are state-sponsored hackers, quite possibly from your own government. While officially unconfirmed, the discovery of backdoors in Juniper’s ScreenOS, correlated with what we know about some of the NSA’s digital interdiction methods ...

Daserf – A Backdoor to Espionage | AT&T Cybersecurity

https://www.alienvault.com/blogs/security-essentials/daserf-a-a-backdoor-to-espionage

Daserf is an example of a backdoor, malware that provides attackers with access to the compromised system. It’s commonly used for data theft, as you can see from the number of AlienVault blog posts that include the term. The Daserf malware has been around for about 10 years, created by a low ...

Governments and Backdoors | AT&T Cybersecurity

https://www.alienvault.com/blogs/security-essentials/governments-and-backdoors

Should governments be given backdoors to technology products? British PM Theresa May has been waging a long battle against encryption, stating that end-to-end encryption in apps like WhatsApp is “completely unacceptable” and that it provides a safe haven for terrorists. The argument crops up ...

Malware Analysis using Osquery | Part 3 | AT&T Alien Labs

https://www.alienvault.com/blogs/labs-research/malware-analysis-using-osquery--part-3

In part 1 of this blog series, we analyzed malware behaviour, and, in part 2, we learned how to detect persistence tricks used in malware attacks. Still, there are more types of events that we can observe with Osquery when malicious activity happens. So, in the last blog post of the series, we will ...

MassMiner Malware Targeting Web Servers | AT&T Alien Labs

https://www.alienvault.com/blogs/labs-research/massminer-malware-targeting-web-servers

One of the biggest malware-trends of 2018 has been the increasing variety of crypto-currency malware targeting servers. One family of mining malware, we’ve termed “MassMiner”, stands out as a worm that not only spreads itself through number of different exploits, but also brute-forces access ...

Chapter 2: Building a SOC: Processes and Best Practices

https://www.alienvault.com/resource-center/ebook/building-a-soc/soc-processes

One of the most valuable tools an airline pilot has at his disposal is the simplest one. A checklist. The checklist enumerates every single thing that must be done in order to maintain safety, avoid risk, and protect valuable lives. This ensures that you can get to your final destination without ...

OceanLotus for OS X – an Application Bundle Pretending to ...

https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application...

Eddie Lee is a seasoned security professional with expertise in a variety of areas including: application security, security tool development, and reverse engineering. He occasionally speaks at security conferences and has been a part of a two-time 1st place CTF team at DEFCON. At AlienVault, he is ...

Command and Control Server Detection: Methods & Best ...

https://www.alienvault.com/blogs/security-essentials/command-and-control-server...

Recently I discussed botnets and the way they represent an ongoing and evolving threat to corporate IT security. This time I’ll be discussing the problem at its source — command and control (C&C) server detection — and the best practices available to help companies deal with it. Lately, botnet ...

Patrick Bedwell's profile | AT&T Cybersecurity

https://www.alienvault.com/blogs/author/pbedwell

Patrick Bedwell VP, Product Marketing. Patrick has been working in information security for over 17 years, creating and executing marketing strategies for both startups and public companies.

2019 SIEM Log Management Solutions by AlienVault

https://www.alienvault.com/solutions/siem-log-management

Single-purpose SIEM software solutions and log management tools provide valuable security information, but often require expensive and time-consuming integration efforts to bring in log files from disparate sources such as asset inventory, vulnerability assessment, endpoint agents, and IDS products ...

1 2 3 4 5 6 7 8 9 10
Watch a Demo ›
Get Price Free Trial