detecting DDoS attack

  • detecting DDoS attack

    Distributed Denial of Service (DDoS) attacks are already ‘permanent residents’ in the cybersecurity statistics, but as time goes by their complexity, sophistication, and duration increases. Here are some interesting statistics on

    Read More
  • SOX for IT teams- introducing sections 302 & 404

    The Sarbanes-Oxley of 2002, often referred to as SOX, is a financial regulation that raised as a response to major accounting scandals from corporates like Enron and WorldCom. SOX regulation goal

    Read More
  • Clarifying APRA CPS 234

    The Australian Prudential Regulation Authority (APRA) is responsible for regulations in Australia’s financial bodies such as banks, insurance, and superannuation companies. As a result of the emerging amount of information on

    Read More
  • MSP attacks- MSPs and client’s point of view

    Hackers breached MSPs and used Webroot console to infect PCs with Sodinokibi ransomware.   The infrastructure of at least three MSPs has been breached, in order to access and deploy ransomware

    Read More
  • The Policy Expert- RDS: Do not allow clipboard redirection

      POLICY DESCRIPTION: Specifies whether to prevent the sharing of clipboard contents (clipboard redirection) between a remote computer and a client computer during a Remote Desktop Services session. You can use this

    Read More
  • RDP clipboard vulnerability

    Major vulnerabilities were discovered in the commonly used Remote Desktop Protocol. Although believed to be a relatively save protocol, Check Point researchers revealed a total of 25 RDP vulnerabilities, with 16

    Read More
  • Don’t let your RDP be the next breach’s smoking gun

    Wormable RDP vulnerability gave the wrongly assumed safe RDP protocol a reality check. However, the truth emerged only a few months ago when Check Point discovered a major vulnerability in the

    Read More
  • Ryuk attack- protect your organization

    Ryuk ransomware was first detected in August 2018. One of its famous attacks happened on 2018 Christmas, attacking several big newspapers including The Wall Street Journal and The New York Times,

    Read More
  • CalCom CHS for DevOps becomes Red Hat certified

    With technology heading towards containerized infrastructure, Linux as a host is becoming more and more prevalent in the enterprise production environment. With that being said, Linux OS default configurations settings are

    Read More
  • The Policy Expert: Configuring Maximum Security Log Size

    Maximum log size should be set to any kind of event logs, as part of your security policy. This configuration’s value is highly important for detecting attacks and investigating their source.

    Read More
  • Docker host hardening guide

    Containerization, which allows organizations to better their IT network effectiveness, is without a doubt a hot topic nowadays. But many of those embracing containers are unaware that misconfiguration of the container

    Read More
  • How to best spend your cybersecurity budget- research based model

    This research aims to show a possible model for a decision making approach for cybersecurity investment in Small and Medium Enterprises (SMEs). The scope of cyber attacks on organizations is endless,

    Read More