Subscribe to our blog!

Post by Category

0 Comments

Proactive Threat Hunting: 2 Tips to Push the Hunt to the Perimeter

Mar 21, 2017

Category: Threats, Packetviper, Threat Hunting

Today’s threats demand more easy, proactive ways to identify, detect and respond to sophisticated attacks. Traditional security measures such as firewalls, IDS, endpoint protection, & SIEMs are each important, but each is only a piece of the network security puzzle.

View Post
0 Comments

Is Your IoT Cyber Defense Plan Really a Plan To Fail?

Mar 6, 2017

Category: DDoS, Defense, Bots, Firewall, IoT, malware, mirai, Cyber Attacks, Krebs

Much concern and effort today revolves around protecting networks from the the awesome power of a large scale DDoS attack like Mirai.  While the spreading of bots can be done in many forms, a good majority are spread by a simple scan to a network range, a response, then a password attempt. This is true for WAN’s and LAN’s and gets to the core of the effectiveness of Mirai.  Mirai was so simple ...

View Post
0 Comments

PacketViper Warns Popular DVR Surveillance Systems Still Spreading Mirai

  Mirai Back Story

View Post
0 Comments

HISCOX Cyber Readiness Report Says "Detection Is Challenging"

Feb 22, 2017

Category: Cybersecurity, Detection

 

View Post
0 Comments

Technology Research and Advisory Companies Need to Get Real!

Feb 21, 2017

Category: Cybersecurity

Do you ever wonder who these technology research and advisory companies are speaking to when they write recommendations on security. If everyone had eight eyes, ten arms, two brains, and an unlimited budget, security would be spectacular! Well, maybe! Unfortunately, the reality of nature that limits our physiology and budgets dictates something different. 

View Post
0 Comments

Cybersecurity: Stop Chasing Your Tail!

Feb 20, 2017

Category: DDoS, mirai, Cyber Attacks

Doesn’t it seem like there are new kinds of risks and attacks on information security from government entities all the way down to security companies? Today, the new trending threats extend to connected cars, refrigerators, TVs, and homes. The scary part… it is only on the rise! The growing risk of cyberattacks combined with the proliferation of new malware technology is astronomical. The rise of ...

View Post
0 Comments

Your Network IS Hacked! 11 Critical Mistakes During Discovery!

Feb 7, 2017

Category: Hack, Mistakes

…And just like that, it happens! You get the call you've been dreading... A user is complaining their machine is running slow and items keep popping up. During the troubleshooting discussion, you discover the critical mistakes that were made.

View Post
0 Comments

Most Dangerous Malware Threats

Feb 2, 2017

Category: Cybersecurity, Threats, Virus, malware

If , you’re connected to the Internet all day. This is why it's crucial to protect and secure your devices and data from malicious software. Malware is a wide range of software applications created with a malicious intent. Unlike legitimate software, malware is installed on your computer without your consent. Malware can be introduced to your computer in a variety of ways such as a virus, worm, ...

View Post
0 Comments

Security Zen and How to Achieve it

Feb 1, 2017

Category: Cybersecurity, malware

Computer technology extends to almost every area of society and social sphere. Our pre-Internet way of life is now consigned to the history books – no one born after the early 1990s has experienced a world without the Internet.

View Post
0 Comments

"Google Malware" is putting Millions at Risk

Jan 31, 2017

Category: google, malware

A new type Malware is putting Google Chrome users at risk . The Virus coaxes users into downloading malware camouflaged as a fix for corrupted fonts, according to a recent report.

View Post