Using AI to Identify Web Anomalies

  Download PDF Order Article Reprints As companies increasingly undergo digital transformation, the value of their data assets also rises, making them even more attractive targets for hackers. The large volume of weblogs warrants the use of advanced classification methodologies in order for cybersecurity specialists to identify web traffic anomalies. This study aims to implement …

Is this attacker’s IP spoofed?

We’re actively sending abuse alert emails to network owners, alerting them to potential compromises on their servers. Recently, several TOR operators (middle, guard, and exit nodes) have reached out, reporting that their IPs were spoofed. While these claims have validity, we’d like to highlight that a significant amount of the TCP port 22 traffic we …

Why our Agent is different from Crowdstrike

The security agent we use in our Managed SOC is just a “grab and log” agent. As such, it doesn’t need deep integration at the OS level like Crowdstrike. So, while Crowdstrike runs at the kernel level, our agent runs natively in user space. This is a much safer approach to security monitoring and threat …

Harnessing Firewall Logs: Optimizing your Firewall/IPS using Analytics

In today’s rapidly evolving digital landscape, maintaining a robust network security posture is paramount. One often overlooked but crucial aspect of this is the regular review and optimization of firewall rules using firewall logs. This practice not only enhances security but also improves network performance. Let’s explore four key areas where firewall log analysis can …

“BulletProof” Hosting Providers

WatchDogCyberDefense has been emailing the Network Owners/Admin of the listed IP address for over 2 years. The attacks keep on coming without any resolution from the Hosted Providers.

BulletProof Hosting Providers
BulletProof Hosting Providers

This is also an indicator of POOR network/security admin performance. No wonder the IP of SV Chrome Hotels is also listed by Virustotal as “malicious”. Our guess is that this network is totally compromised by hackers and the management has no idea that their network/IT guys are complacent about it.

Listed as Malicious by Virustotal
Listed as Malicious by Virustotal