[SANS ISC] New Waves of Scans Detected by an Old Rule

I published the following diary on isc.sans.edu: “New Waves of Scans Detected by an Old Rule“: Who remembers the famous ShellShock (CVE-2014-6271)? This bug affected the bash shell in 2014 and was critical due to the facts that it was easy to exploit and that bash is a widespread shell

[The post [SANS ISC] New Waves of Scans Detected by an Old Rule has been first published on /dev/random]

Continue reading [SANS ISC] New Waves of Scans Detected by an Old Rule

PCI for SMB: Requirement 10 & 11 – Regularly Monitor and Test Networks

Welcome to the seventh post of a series on understanding the Payment Card Industry Data Security Standard–PCI DSS. We want to show how PCI DSS affects anyone going through the compliance process using the PCI SAQ’s (Self Assessment Questio… Continue reading PCI for SMB: Requirement 10 & 11 – Regularly Monitor and Test Networks

[SANS ISC] Tracking Unexpected DNS Changes

I published the following diary on isc.sans.edu: “Tracking Unexpected DNS Changes”: DNS is a key element of the Internet and, regularly, we read new bad stories. One of the last one was the Department of Homeland Security warning about recent DNS hijacking attacks. Indeed, when you want to visit the website ‘isc.sans.org’, you

[The post [SANS ISC] Tracking Unexpected DNS Changes has been first published on /dev/random]

Continue reading [SANS ISC] Tracking Unexpected DNS Changes

[SANS ISC] Using OSSEC Active-Response as a DFIR Framework

I published the following diary on isc.sans.edu: “Using OSSEC Active-Response as a DFIR Framework”: In most of our networks, endpoints are often the weakest link because there are more difficult to control (example: laptops are travelling, used at home, etc).They can also be located in different locations even countries for

[The post [SANS ISC] Using OSSEC Active-Response as a DFIR Framework has been first published on /dev/random]

Continue reading [SANS ISC] Using OSSEC Active-Response as a DFIR Framework