CrowdStrike has released an annual report that reviews intrusion trends during the first half of 2020 and provides insights into the current landscape of adversary tactics, which has been heavily impacted this year by the remote workforce environment o… Continue reading eCrime campaigns outpace state-sponsored activity in first half of 2020
Intrusion announced that its Board of Directors has named Jack B. Blount to the position of President and Chief Executive Officer. Mr. Blount was also appointed as a director of the company. Michael L. Paxton, former Interim President and Chief Executi… Continue reading Jack B. Blount joins Intrusion as President and CEO
An ex-girlfriend has demonstrated an ongoing ability to access files stored only on my Windows 10 x64 PCs and Microsoft OneDrive. How can I find or trace the mechanism by which she is doing this? Details:
Months ago, before we broke up… Continue reading Finding mechanism of unauthorized data access on OneDrive/Windows 10
I recently installed the package AIDE (Advanced Intrusion Detection Environment) on my Linux server. This is a web server installed about a year ago. Since no integrity checks have been done before on this server, I can’t tell if it is hac… Continue reading Possible to verify the integrity of AIDE itself?
During my commute from an airport located in a country whose government is known for intrusions into the privacy of its citizens and non-citizens, I had my laptop taken from me during a routine security procedure. I usually get to see my e… Continue reading How long does it take to have spyware installed on a laptop?
I know what fail2ban does; it monitors the firewall logs and finds ip addresses that have too many failed logins to ssh; and then tells the firewall to drop packets from those addresses.
So is fail2ban an IPS?
Have I fundamentally missed something between the time when I sat with my 486 IBM PC in the house, fully offline, and today? Do normal people actually set up complex local networks in their homes where they have some kind of “trust anyone … Continue reading What do people mean when they talk about "hackers gaining access to our network" (at home)?
My Sourcefire IPS is firing alerts for malicious activity but the source and destination networks dont belong to me, should i be concerned?
Let’s say that some malicious person extracts my hard disk (HDD or SSD) from my laptop, while it is in sleep mode. Is there a way to check for that event?
I am mostly interested for Ubuntu OS, but if there are differences be… Continue reading How to check if hard disk was removed while in sleep mode?
today morning I’ve received an email from Google reporting that my Compute Engine instance of my project was used to scan port 3389 of 144000 ip addresses.
I enabled compute engine some months ago for this project but recentl… Continue reading Google Cloud intrusion