

Dan Pitman
Principal Security Architect /*=$expert->feature_status*/ ?>
Alert Logic
Comments Dotted :
3
November 28, 2019
Starting with educating users is the first protection, treating the root cause of infection being the best plan of attack.
"Detection of polymorphic malware and other threats that avoid traditional signature detection relies on a more behavioural analysis based approach on the endpoint and network. By monitoring for suspicious activity, such as contacting known command and control infrastructure or making requests on the network that are abnormal, the activity of a breach can be detected and the polymorphic malware found – monitoring the behaviour of the computers themselves helps to; by building a model of the.....Read More

November 13, 2019
It’s entirely plausible that someone without any hacking experience paid for the DDoS attack on the ‘dark web’ from what is known as a ‘booter’.
There is no information on who the culprits might be right now, but a DDoS attack is not complex to arrange but takes resources to setup from scratch. It’s entirely plausible that someone without any hacking experience paid for the DDoS attack on the ‘dark web’ from what is known as a ‘booter’ – a paid-for service where a hacking group will lease out their existing botnet to perform the attack. The barriers to entry for a DDoS attacker has been significantly lowered, offering users.....Read More

October 31, 2019
Sometimes "hashing" a password is referred to as encryption.
In this case, the dwell time between attack and detection is not the worst, but they have announced the beach within a good amount of time. They are asking users to reset their password when they login and are in the process of notifying them directly
Web.com has stated that it doesn't believe passwords were compromised because they were encrypted, but don't state what kind of encryption. Sometimes "hashing" a password is referred to as encryption. Hashed passwords that aren't "strong".....Read More
