Does the FBI iPhone Hack Fall Under Ethical Hacking?

Posted in General, network security, Security on April 29th, 2016 by Alienor

The Federal Bureau of Investigation recently cracked a locked iPhone in order to procure evidence against one of the San Bernardino shooters.  Now, the FBI is refusing to inform Apple how it accomplished this. In this post, I’d like to discuss the implications of the tension between the FBI and Apple, as well as whether the FBI iPhone hack falls under ethical hacking.

Read more »

Tags:

Verizon DBIR Hidden Message: cyber.pathogen.ai

Posted in cyber attack, network security on April 28th, 2016 by tomp@plixer.com
Verizon DBIR Hidden Message: cyber.pathogen.ai

Verizon recently released the 2016 Verizon Data Breach Investigations Report. The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides an analysis of information security incidents, focusing on data breaches.  As an active member in the security community I look forward to this report annually. While reading this year’s release, I discovered a hidden message! Read more »

Tags: ,

Detecting DROWN attack

Posted in Network Traffic Monitor, Security on April 27th, 2016 by Jarryd
Detecting DROWN attack

Chances are that unless you are a hermit or have turned yourself into an air-gapped server, you have heard the term “DROWN” kicking around cyberspace. I know that when I see article after article stating that 11 million HTTPS websites are at risk, I tend to get bright-eyed and bushy-tailed. Let’s take a closer look at DROWN and see if your server should be added to that growing list.

Read more »

Tags: ,

NetFlow Security Analytics

Posted in detect network threats, NetFlow Security, network threat detection on April 20th, 2016 by Maciej
NetFlow Security Analytics

NetFlow Security Analytics

Detecting threats and intrusions on your network is an ongoing, evolving process/battle. Keeping up with NetFlow Security Analytics is something we strive for with each rendition of Scrutinizer. Our  algorithms were engineered to effectively identify security breaches, suspicious behavior and provide timely incident response. Read below for some of our latest additions.
Read more »

Maciej Walichnowski
Tags: , ,

ArcSight NetFlow Integration

Posted in Event Correlation on April 13th, 2016 by Anna McElhany
ArcSight NetFlow Integration

Our development team added support for another SIEM solution. Now, not only Splunk and ElasticSearch, but also ArcSight NetFlow Integration is available to Plixer’s customers.

Read more »

Anna McElhany
Technical Support Specialist

For a free 30 day trial of Scrutinizer, Download Now!



Tags: ,