Is this attacker’s IP spoofed?

We’re actively sending abuse alert emails to network owners, alerting them to potential compromises on their servers. Recently, several TOR operators (middle, guard, and exit nodes) have reached out, reporting that their IPs were spoofed. While these claims have validity, we’d like to highlight that a significant amount of the TCP port 22 traffic we …

Why our Agent is different from Crowdstrike

The security agent we use in our Managed SOC is just a “grab and log” agent. As such, it doesn’t need deep integration at the OS level like Crowdstrike. So, while Crowdstrike runs at the kernel level, our agent runs natively in user space. This is a much safer approach to security monitoring and threat …

“BulletProof” Hosting Providers

WatchDogCyberDefense has been emailing the Network Owners/Admin of the listed IP address for over 2 years. The attacks keep on coming without any resolution from the Hosted Providers.

BulletProof Hosting Providers
BulletProof Hosting Providers

This is also an indicator of POOR network/security admin performance. No wonder the IP of SV Chrome Hotels is also listed by Virustotal as “malicious”. Our guess is that this network is totally compromised by hackers and the management has no idea that their network/IT guys are complacent about it.

Listed as Malicious by Virustotal
Listed as Malicious by Virustotal

Maximizing Security and Efficiency: Why Outsourcing to an MSSP is the Smart Choice

When it comes to setting up a Security Operations Center (SOC), organizations have different options based on their size and resources. Organizational size matters. Large organizations often have the capacity to establish an in-house SOC, while small organizations may find it more challenging due to budget and expertise constraints. Here, we will highlight the different …