Using AI to Identify Web Anomalies

  Download PDF Order Article Reprints As companies increasingly undergo digital transformation, the value of their data assets also rises, making them even more attractive targets for hackers. The large volume of weblogs warrants the use of advanced classification methodologies in order for cybersecurity specialists to identify web traffic anomalies. This study aims to implement …

Is this attacker’s IP spoofed?

We’re actively sending abuse alert emails to network owners, alerting them to potential compromises on their servers. Recently, several TOR operators (middle, guard, and exit nodes) have reached out, reporting that their IPs were spoofed. While these claims have validity, we’d like to highlight that a significant amount of the TCP port 22 traffic we …

Why our Agent is different from Crowdstrike

The security agent we use in our Managed SOC is just a “grab and log” agent. As such, it doesn’t need deep integration at the OS level like Crowdstrike. So, while Crowdstrike runs at the kernel level, our agent runs natively in user space. This is a much safer approach to security monitoring and threat …

Harnessing Firewall Logs: Optimizing your Firewall/IPS using Analytics

In today’s rapidly evolving digital landscape, maintaining a robust network security posture is paramount. One often overlooked but crucial aspect of this is the regular review and optimization of firewall rules using firewall logs. This practice not only enhances security but also improves network performance. Let’s explore four key areas where firewall log analysis can …

When You pay peanuts, you get Monkeys

Many companies underestimate cybersecurity risks, allocating minimal budgets due to perceived low likelihood of attacks or overconfidence in existing defenses. However, this short-term cost-saving often backfires when they fall victim to ransomware, incurring massive financial losses and reputational damage. The irony is that investing in robust cybersecurity measures upfront is typically far less expensive than …