paykasa bozdurma
Home > Support > Blog
3 Key Takeaways from the VPNFilter Threat

3 Key Takeaways from the VPNFilter Threat

In late May, malware known as VPNFilter began targeting routers from Linksys, Mikrotik, Netgear, QNAP and TP-Link, as well as network-attached storage (NAS) devices from QNAP. The malware operates in three stages. First, it is installed and maintains a persistent presence on the device so it can contact a command-and-control (C&C) server to download additional modules. 

Monday, June 25, 2018/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (102)/Comments (0)/
Categories: Security Services
The Most Valuable Alert: A Security Analyst’s Perspective

The Most Valuable Alert: A Security Analyst’s Perspective

When setting up monitoring, many people look at the IT assets inside the organization and set up alerts to identify attackers coming after those precious resources. It’s certainly important to be alerted when, say, an unknown user is being added to a Domain Administrator group. It’s a serious threat that’s easy to detect and address.

Tuesday, May 08, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (341)/Comments (0)/
Categories: Security Services
10 Public Wi-Fi Security Tips

10 Public Wi-Fi Security Tips

Public Wi-Fi can be a lifeline when you are traveling, and is available just about everywhere. From coffee shops to hotels to airports, public Wi-Fi is a convenience that makes being on the road a little easier. However, using public Wi-Fi exposes you to risks that you should be aware of and take steps to mitigate.

Monday, January 08, 2018/Author: Todd Rothman, Cybersecurity Operations Manager /Number of views (393)/Comments (0)/
Remote Code Execution Vulnerabilities Dominate the Security Headlines

Remote Code Execution Vulnerabilities Dominate the Security Headlines

On Nov. 8, Microsoft published a security advisory about a remote code execution vulnerability in Microsoft Office documents with Dynamic Data Exchange (DDE) fields. The advisory was related to three separate phishing campaigns containing attachments that used the DDE protocol to download and execute malicious code.

Wednesday, December 06, 2017/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (400)/Comments (0)/
Categories: Security Services
The WPA2 Security Flaw: What You Should Know

The WPA2 Security Flaw: What You Should Know

A security researcher has reported a serious vulnerability in the Wi-Fi Protected Access II (WPA2) security protocol that could allow hackers within range of a wireless network to intercept data, or even inject malicious content or malware in certain cases. The flaw was discovered by Mathy Vanhoef of the Imec-DistriNet Research Group of Belgian university KU Leuven. Vanhoef executed a successful attack as a proof of concept.

Tuesday, October 31, 2017/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (469)/Comments (0)/
Categories: Security Services
RSS
123