Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the SSDP protocol, describing in detail the prevention, detection and response phases.
The malicious code of the ransomware known as ‘Hive’ represents a threat to all users, as it implements encryption functionalities on the information in an infected computer, making simple recovery of the data impossible. This threat attempts to use extortion to recover the information, demanding a payment and threatening publication of part of the stolen information on a blog through the network Tor if the payment is not forthcoming.
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the SSDP protocol, describing in detail the prevention, detection and response phases.
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the NetBIOS protocol, describing in detail the prevention, identification and response phases to follow.
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the UBNT protocol; it describes in detail the prevention, identification and response phases that must be adopted.
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the Portmapper protocol; it describes in detail the prevention, identification and response phases that must be adopted.
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the CharGEN protocol; it describes in detail the prevention, identification and response phases that must be adopted.
This post sets out some courses of action that must be followed to deal with a DrDoS cyberattack based on the Memcached service; it describes in detail the prevention, identification and response phases that must be undertaken
Anatsa is a banking Trojan designed for Android devices that has become particularly relevant since its discovery in January 2021. Throughout the study, a detailed technical analysis of the threat is carried out using a sample of the malicious code in question to show how this malware behaves and the possibilities it offers.
This post sets out some lines of action that must be followed to deal with a DrDoS cyberattack based on the LDAP protocol; it describes in detail the prevention, identification and response phases that must be undertaken.