NETWORK

THREAT HUNTING FOR SUSPICIOUS FILE TYPES ON THE NETWORK

This post was originally published here by Chris Sanders. Not all attacks require the use of malware, but most of them can be traced back to some form of unwanted malicious code executing on a trusted system. The files can be compiled executables, simple scripts, or even office documents hiding malicious macros. While these types […]

Endpoint and Network Hunting: A Q&A with Ryan Nolette

This post was originally published here by Sqrrl Team. Ryan Nolette is a security technologist at Sqrrl. Throughout his career  he has attained experience in IT/Security planning at a large scale and is proficient in multiple platforms and security techniques. He has experience with troubleshooting, auditing and installations, network intrusion detection, security, incident response, threat intelligence, […]

Network Segmentation could protect your small business network from Cyber Attacks

Security has become an important issue to focus on small businesses that rely on websites, smartphones, and connected devices. Thus, a network security company called Tufin has released an info graphic titled “ Making Security Manageable Through Network Segmentation” which introduces us to a new concept called network segmentation. The report suggests that “Network Segmentation” […]

The Hunter’s Den: Lateral Movement Part 1- Understanding Lateral Movement

This post was originally published here by Sqrrl Team. The Hunter’s Den blog series aims to go beyond framework and theory and dig into practical tips and techniques for threat hunting. In our previous post, we examined the practical ways to hunt for C2 activity. In this series of posts, we will take a look […]

Cisco launches new technology to detect cyber threats in networks

Networking giant Cisco has come up with a new software technology called “Encrypted Traffic Analytics” which can detect malware when it’s hidden in encrypted traffic and can immediately alert the network admins about the presence of malicious software. The California-based company claims that this “intent based” technology is the first to hit the networking world […]

BUILD YOUR (ISC)² NETWORK THROUGH CHAPTERS IN EMEA AND NORTH AMERICA

This post was originally published here by  (ISC)² Management. Are you looking to start an (ISC)² Chapter in your area? The enrollment period for chapters in the Europe, Middle East and Africa (EMEA) and North America regions is now open through February 5. Through the chapter program, (ISC)² members and other information security professionals further […]

Share this page