The Curious Case of Alexsey Belan and 1.2 Billion Compromised Accounts
Most of the damage caused by Alexsey is concentrated between 2012 and 2013 connect him to massive breaches at Yahoo, Evernote and Zappos, but we also have some key details behind his techniques.
WannaCry – A Propagation brought to you by EternalBlue and DoublePulsar
The large-scale ransomware attack WannaCry targets Windows machines via EternalBlue / DoublePulsar
Cutting Through the Noise to Find Web Application Attacks. Really!
New capabilities from Alert Logic that find difficult to detect web application attacks.
Web Application Attacks – Crushing the Competition for Security Breaches
When businesses move into the cloud, the risks for security breaches increase exponentially without web application security.
The Shadow Brokers (TSB) vs. Equation Group: Third Time is the Charm
An in-depth discussion of the recent Equation Group hacking toolset taken and released by the Shadow Brokers group, covering how Alert Logic is researching, prioritizing, developing, and deploying detection capability for customers.
Layering Protection in Your Azure Environment
To follow up with the Azure Security Best Practices Webinar, we review best practices and native capabilities in Azure to help you protect your workloads
running in the cloud.
Ironically Positive Fallout from Vault-7 : Cisco Vault-7 CVE-2017-3881
A vulnerability affecting more than 300 different Cisco router SKU’s was discovered by Cisco in the Wikileaks’ Vault-7 dump of classified CIA hacking tools and tactics utilized to gain unauthorized access to iPhone and Android Devices.
Unfolding the Apache Struts Vulnerability
Protecting and Monitoring Apache Struts, which is a critical remote code execution vulnerability affecting Struts newer versions of 2.3.5 – 2.3.31 and Struts 2.5-2.5.10.
Apache Struts Makes a Comeback
Apache Struts is a critical remote code execution vulnerability affecting Struts newer versions of 2.3.5 – 2.3.31 and Struts 2.5-2.5.10.
Three Key Elements for Integrating Security with Automated Microsoft Azure Deployments
Although there is no established framework that covers security for DevOps, we have outlined three key elements for integrating security with automated Microsoft Azure deployments.
Microsoft Azure Cloud Usage is Growing – Don’t Forget About Security
Alert Logic can help to protect your workloads in Microsoft Azure
3 New Year’s Resolutions That Every CSO Should Make
Optimize your security with three resolutions that every CSO should make to guide your efforts to staying secure in the cloud.