All Network Security
gloomy forest scene

Unmasking the Covert Threat: How Plixer Shields Networks from the Sophisticated Agent Raccoon

The digital landscape can sometimes seem a bit like a dense forest after dark, with new and unseen threats potentially lurking everywhere. That’s why...

The Essential Role of Network Monitoring in Network Security

Every year, there is a greater number of breach disclosures. Some do so for the first time; for other organizations, it’s the latest in...

Map of decoy dog attacks

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit

In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about the “Decoy Dog” exploit have...

endpoint security

Endpoint security explained: challenges and best practices for businesses

If you work on a corporate security team, endpoint security is an important framework to understand. After reading this blog, you’ll know the ins...

jimd

Building a geo attack map with the Scrutinizer API: part 2

So far we have used the Scrutinizer API to build a dataset that tells us how many hits our top ten countries are getting....

jimd

Building a geo attack map with the Scrutinizer API

Every once in a while I get the opportunity to sit down and work on things that are outside of the box when it...

How can data theft be prevented?

Corporate data theft is nothing new. In fact, according to a study conducted by McAfee, “ majority of IT professionals have experienced at least one data...

traci

This is how I found out FaceApp was stealing my data

FaceApp is another selfie service that allows you to share aging and other filtered photos with your friends. It has been downloaded by millions...

joanna

Phishing detection: what not to do and how we help

Phishing attempts have been showing up a lot in the news lately and scammers are getting smarter. What can we do? What shouldn’t we...