Security Research

Attackers_Turkey

Investigating an attack originating from a Turkish IT services provider

Today we have another study case which alerted our curiosity. As usual our software ACSIA is constantly monitoring our server infrastructure and notifying us in real-time of any anomalous activity targeting our servers. This one is indeed another interesting case therefore let’s not wait long and start immediately looking into the case. Less talk more …

Investigating an attack originating from a Turkish IT services provider Read More »

A Malicious attacker disguised as a Malware Hunter

A Malicious attacker disguised as a Malware Hunter

Within the space of a week we had yet another unusual case to investigate thanks to ACSIA (www.acsia.io) monitoring our systems regularly and notifying us in real time of anomalies and irregularities targeting our server infrastructure. Now lets walk through this particular case in a little detail. ACSIA notified the event as an XSS attack, …

A Malicious attacker disguised as a Malware Hunter Read More »

bot-icon-2883144_640

Investigating Online Botnets

(A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data,send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software.) From …

Investigating Online Botnets Read More »

Scroll to Top