Quantcast
Channel: Firedot – Network honeypot sensor
Browsing latest articles
Browse All 90 View Live

Anatomy of an Attack on the Industrial IoT

How cyber vulnerabilities on sensors can lead to production outage and financial loss. Source: Vulnerabilitys & Threats

View Article


Image may be NSFW.
Clik here to view.

A Timeline of APT28 Activity

APT28 (aka Fancy Bear, aka Pawn Storm, aka Sednit, aka Sofacy, aka Group 74, aka Sednit, aka Sofacy, aka Strontium, aka Threat Group-4127) finds its way into the news with some regularity. Most...

View Article


WTB: OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan

The intelligence in this week’s iteration discuss the following threats: APT37, ASMI Bypassing, Bank Account Breaches, Business Email Compromises, Cryptojacking, NetwiredRC, OilRig, OMG Botnet and...

View Article

We’re All Vulnerable in the Internet of Things

A short while ago, if you’d asked me which countries in the world were the least vulnerable to cyber security breaches, I would have said “the richest ones, of course! They can afford all the security...

View Article

Why Cryptocurrencies Are Dangerous for Enterprises

When employees mine coins with work computers, much can go wrong. But there are some ways to stay safe. Source: Vulnerabilitys & Threats

View Article


Image may be NSFW.
Clik here to view.

Measuring the Effectiveness of Threat Feeds

We do a lot of important and sometimes complicated things as we try to defend organizations from cyber attacks. One thing that often gets left behind, or at least isn’t done as effectively as it could...

View Article

CERT.org Goes Away, Panic Ensues

Turns out the Carnegie Mellon CERT just moved to a newly revamped CMU Software Engineering Institute website. Source: Vulnerabilitys & Threats

View Article

WTB: GitHub Survived the Biggest DDoS Attack Ever Recorded

The intelligence in this week’s iteration discuss the following threats: APT, Cyber espionage, Credit and debit card theft, Data breach, Data theft, DDoS attacks, Malicious applications, Misconfigured...

View Article


Research: Potential and Realized Threats to the United Kingdom

Anomali recently conducted research to assess the threat landscape of the United Kingdom and determine where adversaries may choose to focus their attention. The report examines various Critical...

View Article


Hacker Tactics – Part 4: Cryptominers

Adversaries are constantly changing and improving how they attack us. In this six-part series we’ll explore new or advanced tactics used by threat actors to circumvent even the most cutting-edge...

View Article
Browsing latest articles
Browse All 90 View Live