Cybersecurity spending trends and their impact on businesses

Managing cybersecurity and IT budgets is a critical element of organizational strategy. With increasing threats to data security, the rise of ransomware, and the need to protect IT infrastructure, organizations must invest wisely in cybersecurity to st… Continue reading Cybersecurity spending trends and their impact on businesses

iOS devices more exposed to phishing than Android

The mobile threat landscape continues to grow at an alarming rate as cybercrime groups shift their tactics and target mobile devices in the early stages of their attacks, according to a recent Lookout report. The report highlights insights behind a 17%… Continue reading iOS devices more exposed to phishing than Android

Capturing Honeypot Data Beyond the Logs, (Thu, Dec 26th)

By default, DShield Honeypots [1] collect firewall, web and cowrie (telnet/ssh) [2] data and log them on the local filesystem. A subset of this data is reported to the SANS Internet Storm Center (ISC) where it can be used by anyone [3]. A common question that comes up from new users is whether there is any benefit to collecting PCAP data from the honeypots if the active services are already being logged. One example I often give of a useful benefit of having PCAPs is HTTP POST data. This data is not currently captured within the web honeypot logs, but can be seen within the PCAP data.

Continue reading Capturing Honeypot Data Beyond the Logs, (Thu, Dec 26th)

Posted in Uncategorized