Latest posts
EDP Starter acceleration program
Great news: the #EntIrl client @4securitas has been selected as pilot project in the #EDP Starter acceleration program 2018 today at #Google Campus Madrid #HPSU…
Ethereum cryptocurrency hacked over 20 million value.
https://thehackernews.com/2018/06/ethereum-geth-hacking.html?utm_source=dlvr.it&utm_medium=linkedin&m=1 As Bruce Schneier, security expert, notes “the security mindset involves thinking about how things can be made to fail. It involves thinking like an…
Investigating an attack originating from a Turkish IT services provider
Today we have another study case which alerted our curiosity. As usual our software ACSIA is constantly monitoring our server infrastructure and notifying us in…
A Malicious attacker disguised as a Malware Hunter
Within the space of a week we had yet another unusual case to investigate thanks to ACSIA (www.acsia.io) monitoring our systems regularly and notifying us…
Data Collection masking as research – a journey to the source of an attack targeting our web server.
Today our security product, ACSIA (www.acsia.io) detected numerous attacks but one in particular took our attention. The attack originated from Chicago Illinois and it seemed…
ACSIA Capturing Sophisticated BotNet Attacks Originating From Dallas – USA
With all the excitement of our first Release Candidate launch last week, it’s nice to step back and get some feedback from our system. We…
The 4Securitas Team is proud to announce the first release candidate of ACSIA RC v0.1.
ACSIA Release Candidate v0.1 The 4Securitas Team is proud to announce the first release candidate of ACSIA RC v0.1. What is ACSIA? ACSIA is an…
Investigating Online Botnets
(A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service…
Cyber security: an important issue for small businesses
We examine why companies are continuing to fall victim to cyber attacks despite increased awareness of such threats, and gives us some proactive steps companies…
Cloud Security: Challenge your assumptions
Recent UK Government statistics found that nearly half of all UK businesses suffered a cyber breach or attack in the past 12 months. Firms holding…