Blog

Updating your main database: your brain

  • All
  • Cybersecurity
  • Network Management
  • Big Data
  • Open Source
  • Startup
  • RBCSIRT
  • Malware

May 30 2018

IDS, Securing your Network from attacks

IDS, Securing your Network from attacks

Many companies deploy intrusion detection systems (IDS) to gain visibility into potentially malicious activities happening within their technology environments. Why are they so important?

 

  Read more
Cybersecurity

May 29 2018

Carbanak and Cobalt malware attacks

Case study: The Carbanak cybercrime group

This cybercrime group behind the malware, infected systems through spear phishing in order to spy on staff, watch how they transferred cash, and then mimic the techniques to transfer funds fraudulently without being discovered until last March. Have you heard about them before?

 

  Read more
Malware

May 28 2018

IOT Y ATAQUES DDOS

IoT Y ataques DDoS

IoT aún sigue evolucionando, pero los hackers ya están explotando las vulnerabilidades de seguridad de los dispositivos IoT para obtener acceso a los sistemas, incluidos los sistemas de control industrial en los que se sustenta la infraestructura más importante. Las organizaciones siguen agregando dispositivos IoT a sus entornos de TI preocupándose muy poco o nada en absoluto sobre la seguridad o, lo que es peor, sin tomarse el tiempo necesario para evaluar cuántos dispositivos IoT están tocando sus redes. De esta forma, facilitan que los hackers tomen el mando de IoT.

  Read more
Cybersecurity

January 19 2017

What WhatsApp's end-to-end encryption means for your cybersecurity

Last year, popular mobile messaging application WhatsApp introduced end-to-end encryption for all messages sent and received over its servers. While this sounds great on the surface, few of its users know what exactly this means for their data security and how it's different from the company's previous system.

  Read more
Cybersecurity

January 18 2017

How to ensure that your API endpoints are secure

Application programming interfaces (APIs) are increasingly utilized by businesses to add value to their services and increase potential revenue streams. For businesses that subscribe to Software as a Service (SaaS) and Platform as a Service (PaaS) packages, APIs add a further dimension to the services that can cater for specific needs and requirements.

  Read more
Network Management
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read more