In a world where networks expand, data demands escalate, and customer expectations rise, ViewRAN diagnostic tools, supported by Elasticsearch, stand as a must for modern telecommunication operators. Committed to delivering top-tier radio access network (RAN) monitoring and diagnostics, ViewRAN provides ongoing instant prompts and insights to mobile network operators. This … [Read more...] about Next-level quality in radio access network management: Creating better customer experiences with ViewRAN solutions and the Elastic Stack
Creating
Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot Malware
Dec 02, 2023NewsroomCybercrime / Malware A Russian national has been found guilty in connection with his role in developing and deploying a malware known as TrickBot, the U.S. Department of Justice (DoJ) announced. Vladimir Dunaev, 40, was arrested in South Korea in September 2021 and extradited to the U.S. a month later. "Dunaev developed browser modifications and malicious … [Read more...] about Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot Malware
Black Hat USA 2022: Creating Hacker Summer Camp
In part one of this issue of our Black Hat USA NOC (Network Operations Center) blog, you will find: Adapt and Overcome Building the Hacker Summer Camp network, by Evan Basta The Cisco Stack’s Potential in Action, by Paul Fidler Port Security, by Ryan MacLennan, Ian Redden and Paul Fiddler Mapping Meraki Location Data with Python, by Christian Clausen Adapt and Overcome, by … [Read more...] about Black Hat USA 2022: Creating Hacker Summer Camp
Creating a Path to Successful Security Hygiene
Security posture management challenges are driven by the growing attack surface. Organizations have accelerated cloud computing initiatives and have been forced to support a growing population of remote users as a result of the pandemic. Firms are also deploying new types of devices as part of digital transformation initiatives, further exacerbating the growing attack surface, … [Read more...] about Creating a Path to Successful Security Hygiene
Creating Wireless Signals with Ethernet Cable to Steal Data from Air-Gapped Systems
A newly discovered data exfiltration mechanism employs Ethernet cables as a "transmitting antenna" to stealthily siphon highly-sensitive data from air-gapped systems, according to the latest research. "It's interesting that the wires that came to protect the air-gap become the vulnerability of the air gap in this attack," Dr. Mordechai Guri, the head of R&D in the Cyber … [Read more...] about Creating Wireless Signals with Ethernet Cable to Steal Data from Air-Gapped Systems
Between the Chair and the Keyboard: Creating Security Culture
Every time someone picks up a mouse, they make a choice to either strengthen or lessen our security posture. The security team can impact these choices through culture. For a long time, however, it was difficult to know what had to be present to create and manage security culture. The recent Cisco Security Outcomes Study finally shed some light on these factors. Provide a … [Read more...] about Between the Chair and the Keyboard: Creating Security Culture
Creating A Strong Password Policy With Specops and NIST Guidelines
End-user passwords are one of the weakest components of your overall security protocols. Most users tend to reuse passwords across work and personal accounts. They may also choose relatively weak passwords that satisfy company password policies but can be easily guessed or brute-forced. Your users may also inadvertently use breached passwords for their corporate account … [Read more...] about Creating A Strong Password Policy With Specops and NIST Guidelines
Creating more opportunities for others in cybersecurity
Security Stories podcastThe Security Stories podcast is all about security leaders sharing their journeys with us. In our latest episode, we have some very meaningful stories to talk about with you. Our main interview is with Andy Ellis. On the very day we interviewed him, he was celebrating his 20th anniversary as the Chief Security Officer for Akamai. We cover many topics – … [Read more...] about Creating more opportunities for others in cybersecurity