Security Monitoring

Security Monitoring

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network -- first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. These recommendations will help you select and deploy the very best tools to monitor your own enterprise network.


Friday, July 25, 2014

evning update on what is hapning

first up a new development on the 
Trojan-Ransom.Win32.Onion brand

CTB-Locker Ransomware Uses Unusual Cryptographic Scheme: Kaspersky 

              Just found this interesting article on how some 
Black hat hackers abuse explore on windows 
 This article in my opinion shows just how exposed microsoft 
products is to hacker activity, and maybe how
slow there are to fix things :)

Attackers abusing Internet Explorer to enumerate software and detect security products

- See more at: http://www.alienvault.com/open-threat-exchange/blog/attackers-abusing-internet-explorer-to-enumerate-software-and-detect-securi/?utm_medium=Social&utm_source=Twitter#sthash.UDkLHHxe.dpuf

Attackers abusing Internet Explorer to enumerate software and detect security products

- See more at: http://www.alienvault.com/open-threat-exchange/blog/attackers-abusing-internet-explorer-to-enumerate-software-and-detect-securi/?utm_medium=Social&utm_source=Twitter#sthash.UDkLHHxe.dpuf
Next up is what could be a advertise but not intentional 

Improved Malware Protection Introduced in Firefox Browser

Think that is it for to night but no one knows

Attackers abusing Internet Explorer to enumerate software and detect security products

- See more at: http://www.alienvault.com/open-threat-exchange/blog/attackers-abusing-internet-explorer-to-enumerate-software-and-detect-securi/?utm_medium=Social&utm_source=Twitter#sthash.UDkLHHxe.dpuf

Attackers abusing Internet Explorer to enumerate software and detect security products

- See more at: http://www.alienvault.com/open-threat-exchange/blog/attackers-abusing-internet-explorer-to-enumerate-software-and-detect-securi/?utm_medium=Social&utm_source=Twitter#sthash.UDkLHHxe.dpuf

Attackers abusing Internet Explorer to enumerate software and detect security products

- See more at: http://www.alienvault.com/open-threat-exchange/blog/attackers-abusing-internet-explorer-to-enumerate-software-and-detect-securi/?utm_medium=Social&utm_source=Twitter#sthash.UDkLHHxe.dpuf

Attackers abusing Internet Explorer to enumerate software and detect security products

- See more at: http://www.alienvault.com/open-threat-exchange/blog/attackers-abusing-internet-explorer-to-enumerate-software-and-detect-securi/?utm_medium=Social&utm_source=Twitter#sthash.UDkLHHxe.dpuf

Attackers abusing Internet Explorer to enumerate software and detect security products

- See more at: http://www.alienvault.com/open-threat-exchange/blog/attackers-abusing-internet-explorer-to-enumerate-software-and-detect-securi/?utm_medium=Social&utm_source=Twitter#sthash.UDkLHHxe.dpuf

No comments:

Post a Comment