Incident Response and its Best Practices Using Wazuh

Incident Response and its Best Practices Using Wazuh

 Digital security for the business sector and enterprises is crucial. Keeping this in view, 2021 was marked by cyberattacks and major data breaches. Not just that, also ransomware has emerged as a major role in the cyber community. Wazuh is an open-source security...

read more
Google Chrome Zero-Day Weaponized to Spy on Journalists

Google Chrome Zero-Day Weaponized to Spy on Journalists

Candiru attackers breached a news agency employee website to target journalists with DevilsTongue spyware, researchers say.   A zero-day vulnerability in Google Chrome was used by the established spyware group Candiru to compromise users in the Middle East —...

read more
Detecting Domain Generating Algorithms

Detecting Domain Generating Algorithms

How can we prevent malware from communicating with a C&C server? You may think of using a CTI (Cyber Threat Intelligence) feed with a network blacklisting appliance. You may also think about blocking certain protocols or even using a Next-Generation Firewall to...

read more

Pin It on Pinterest