Quantcast
Channel: Firedot – Network honeypot sensor
Browsing all 90 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Smart Building Technology Trends for 2018

In 2018, smart building technologies that increase energy efficiency will continue to be at the top of the list for building managers and tenants. These technologies can generate a solid ROI by...

View Article


Image may be NSFW.
Clik here to view.

Energy Industry Technology Trends for 2018

Unlike any other time, technology is having a tremendous impact on the energy industry. Some of the major trends are in areas we’re familiar with, yet the level of activity has increased dramatically....

View Article


Recent WebBlocker Issue in Europe

WebBlocker Incident Report Users of the WebBlocker service in Europe experienced an outage late Thursday night that lasted into Friday morning, January 25 – 26, 2018. WatchGuard has worked closely with...

View Article

The 2018 Winter Olympics in PyeongChang, South Korea and Impact to the Cyber...

Major events like the Winter Olympics attract a lot of attention from fans all around the world.  For three weeks fans will watch in person, on televisions, and online to follow the various competitive...

View Article

End of Sale Announcement: WatchGuard 802.3af PoE Injector

WatchGuard will discontinue offering for sale (EOS) WatchGuard 802.3af PoE Injector for access points on April 1, 2018.  At that time, hardware accessory SKU WG8568 will be discontinued and removed...

View Article


WTB: Android Devices Targeted by New Monero-Mining Botnet

The intelligence in this week’s iteration discuss the following threats: Botnet, Cryptocurrency miner, Cyber espionage, Ransomware, Targeted attacks, and Vulnerabilities. The IOCs related to these...

View Article

How the No-Fly List Approach Can Be Used to Improve Cybersecurity

We’ve all heard of the No-Fly List. Managed by the FBI’s Terrorist Screening Center, the list bans people on it from boarding commercial aircraft within, into, or out of the United States. The No-Fly...

View Article

Image may be NSFW.
Clik here to view.

How Rogue Ales Makes a Great Beer from Wet Hops, Clean Water and Innovation

The challenge is local and global. The world has a major perishables problem. A full 30 percent of all perishable produce and products never make it all the way from the farm to the table. For Rogue...

View Article


North Korean Cybersecurity Profile

North Korea, or more formally, the Democratic People’s Republic of North Korea (DPRK), is no stranger to international headlines. Most notably, it has captured attention in recent years for its nuclear...

View Article


Cisco Issues New Patch for Critical ASA Vulnerability

Cisco engineers discover that the flaw in Adaptive Security Appliance devices is worse than they initially understood. Source: Vulnerabilitys & Threats

View Article

Image may be NSFW.
Clik here to view.

Retailer Resolutions for 2018

The numbers are in and the results are clear. Retailers enjoyed a very good holiday season. Not only was U.S. retail spending up 4.9 percent over the previous year, but a new tax law promises to leave...

View Article

Getting into Tech…for the Non-Technical

My name is Teddy Powers. I have worked for Anomali (formerly ThreatStream) for almost the last three years and it’s been one of the best experiences of my life. But if you looked at my résumé or...

View Article

WTB: Olympic Destroyer Takes Aim At Winter Olympics

The intelligence in this week’s iteration discuss the following threats: Compromised server, Cryptocurrency miner, Data theft, Malspam, Phishing, Targeted attacks, Underground markets, and...

View Article


Taking the cyber No-Fly list to the skies

In our last post, we talked about how companies can use the concept of a No-Fly list to keep malicious actors out of their networks. So how does a cyber No-Fly list work in a real situation? We spoke...

View Article

Image may be NSFW.
Clik here to view.

Generating Your Own Threat Intelligence Feeds in ThreatStream

Getting threat intelligence into your existing security products – SIEMs, endpoints, network tools — can significantly enhance their effectiveness. Here at Anomali we understand the value of product...

View Article


Image may be NSFW.
Clik here to view.

Rewriting the Social Contract for Aging

Imagine you had a magic wand, and with a quick flip you cast America with an aging “social contract.” One in which few go to college and most would retire by age 65. Many of whom stay withdrawn and...

View Article

Vulnerabilities Broke Records Yet Again in 2017

Meanwhile, organizations still struggle to manage remediation. Source: Vulnerabilitys & Threats

View Article


Image may be NSFW.
Clik here to view.

Heads Up! A Phishing Attack Early Warning System

You’re probably familiar with Anomali’s Threat Bulletins. If not, go and have a read of our most recent one covering “TODO.” Threat Bulletins provide information about an event to derive information...

View Article

WTB: Jenkins Miner: One of the Biggest Mining Operations Ever Discovered

The intelligence in this week’s iteration discuss the following threats: AWS Leaks, Breaches, Cryptominers, Exit Scams, Google AdWords, Jenkins server vulnerabilities, Lazarus Group, Rapid Ransomware...

View Article

Gateway Antivirus Issue: Root Cause Analysis

Summary: WatchGuard had an issue with Gateway Antivirus (GAV) signatures on February 7th , 2018 that affected M300, M200, and T35 appliances running firmware version 12.0 and later. An error in the...

View Article
Browsing all 90 articles
Browse latest View live