paykasa bozdurma
Home > Support > Blog
3 Key Takeaways from the VPNFilter Threat

3 Key Takeaways from the VPNFilter Threat

In late May, malware known as VPNFilter began targeting routers from Linksys, Mikrotik, Netgear, QNAP and TP-Link, as well as network-attached storage (NAS) devices from QNAP. The malware operates in three stages. First, it is installed and maintains a persistent presence on the device so it can contact a command-and-control (C&C) server to download additional modules. 

Monday, June 25, 2018/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (102)/Comments (0)/
Categories: Security Services
How to Use a Password Manager to Implement Good Password Practices

How to Use a Password Manager to Implement Good Password Practices

We’ve previously discussed what not to do when constructing passwords. I put a stake in the ground at 14 printable ASCII characters for offline systems and 20 for systems accessible over the internet. (Remember that those are minimum numbers. I tend to default to 32 characters whenever possible). Couple this with a “no repeat” recommendation and most people’s brains are about to explode! 

Monday, June 11, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (131)/Comments (0)/
Categories: Security Services
Tags:
The Most Valuable Alert: A Security Analyst’s Perspective

The Most Valuable Alert: A Security Analyst’s Perspective

When setting up monitoring, many people look at the IT assets inside the organization and set up alerts to identify attackers coming after those precious resources. It’s certainly important to be alerted when, say, an unknown user is being added to a Domain Administrator group. It’s a serious threat that’s easy to detect and address.

Tuesday, May 08, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (341)/Comments (0)/
Categories: Security Services
A Security Expert Explains the Top Password Pitfalls

A Security Expert Explains the Top Password Pitfalls

Typically, when I speak to someone about passwords and how to improve them, the follow-up question to the instructional “do this” is inevitably “why?” So we’re going to start with “why certain passwords are bad” and then follow up in a few weeks with “what should we do about that?” This post will attempt to show you the pitfalls many passwords fall into, broken down into four main categories.

Tuesday, April 24, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (400)/Comments (0)/
Categories: Security Services
How to Break the Cyberattack Chain and Prevent a Security Breach

How to Break the Cyberattack Chain and Prevent a Security Breach

The SageNet Cybersecurity team has seen a recent trend in phishing attacks against organizations with Office 365. Using open source intelligence (OSINT) techniques, such as searching Google or LinkedIn, attackers are gathering email addresses of employees of the target organization and sending phishing emails from outside the organization. The goal of this campaign is to collect the Office 365 credentials of one or more employees.

Monday, April 02, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (321)/Comments (0)/
Categories: Security Services
RSS
12345678910 Last