Security Research

It is time to re-evaluate Cyber-defence solutions – Christmas reading…

At this stage I really think it is time to re-evaluate Cyber-defence solutions on the market Just where is the Global Cyber-defense Market going, and why is it failing so spectacularly to protect the data assets of the largest and most heavily protected government institutions and corporate companies in the world. It is a great …

It is time to re-evaluate Cyber-defence solutions – Christmas reading… Read More »

Attackers_Turkey

Investigating an attack originating from a Turkish IT services provider

Today we have another study case which alerted our curiosity. As usual our software ACSIA is constantly monitoring our server infrastructure and notifying us in real-time of any anomalous activity targeting our servers. This one is indeed another interesting case therefore let’s not wait long and start immediately looking into the case. Less talk more …

Investigating an attack originating from a Turkish IT services provider Read More »

A Malicious attacker disguised as a Malware Hunter

A Malicious attacker disguised as a Malware Hunter

Within the space of a week we had yet another unusual case to investigate thanks to ACSIA (www.acsia.io) monitoring our systems regularly and notifying us in real time of anomalies and irregularities targeting our server infrastructure. Now lets walk through this particular case in a little detail. ACSIA notified the event as an XSS attack, …

A Malicious attacker disguised as a Malware Hunter Read More »

bot-icon-2883144_640

Investigating Online Botnets

(A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data,send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software.) From …

Investigating Online Botnets Read More »

Scroll to Top