Security Analysis of the Parler Data Dump
Summary It is important to note that high-level data leaks tend to come with large amounts of misinformation, especially when there’s great interest from the outside. In this ca...
Read MoreDetecting RDP Attacks With Honeypots: Blumira Data Insights
Windows RDP (Remote Desktop Protocol) allows for convenient remote access connections to desktops and servers and is very useful for IT teams to manage their infrastructure. Since ...
Read MoreInternet Explorer Groundhog Day Critical Vulnerabilities
Internet Explorer Groundhog Day Critical Vulnerabilities This past Friday night (2020-01-17), Microsoft quietly released a new Internet Explorer (IE) critical vulnerability that w...
Read MoreWindows Certificate Spoofing Vulnerability
What Happened Today (2020-01-14) Microsoft announced that Patch Tuesday would include a fix for CVE-2020-0601, a critical bug in the CryptAPI.dll. This bug allows attackers to s...
Read MoreWhat is the Citrix Gateway exploit? How should I respond?
Exploits Released for Citrix Application Delivery Controller (ADC) and Citrix Gateways This weekend two Proof of Concept exploits were made publicly available, released 23 days af...
Read MoreExceeding PCI Requirements to Detect & Respond to Threats
Meet & Exceed Your PCI Requirements By Detecting & Responding To Threats Security technologies such as firewalls are meant to prevent data security breaches, or at least d...
Read MoreHow Much is Your SIEM Solution Costing You?
Estimating Total Cost of Ownership of Your SIEM Gartner has stated the importance of a SIEM deployment concisely: “The need for early targeted attack detection and response is d...
Read MoreDetection as an Effective Strategy for Cyber Attacks
Preventing a Cyberattack When it comes to preventing cyberattacks, being prepared is more than half the battle. But reacting to an incident without a plan is downright dangerous. ...
Read MoreHow to Determine (And Stick To) a Cybersecurity Budget
You have to spend money to protect money. Wait a minute…that sounds different than what we’ve heard before. Isn’t it supposed to be “You’ve got to spend money to make m...
Read MoreComplete Guide to the NIST Cybersecurity Framework
In 2013, Barack Obama mandated the establishment of the NIST Cybersecurity Framework via an Executive Order. By 2014, the US National Institute of Standards and Technology (N...
Read More