Security Monitoring

Security Monitoring

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network -- first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. These recommendations will help you select and deploy the very best tools to monitor your own enterprise network.


Thursday, July 10, 2014

afternoon in a hot northen denmark

First up is some news on a point of sale attack that have been running for some weeks
this time a tor based bot net

RSA Uncovers Infrastructure Behind New Point-of-Sale Attack Operation

 

Man point of sale attacks just seems to evolve each day and new mall ware and virus get released each day

BrutPOS Botnet Targets POS Systems With Brute-Force Attacks

And now to a interesting proof of concept of how to weaponise  a flash file 

Weaponised Flash flaw can pinch just about anything from anywhere

No comments:

Post a Comment