All Uncategorized
The word malware on a monitor emphasized in a magnifying glass surrounded by code.

Prevent Catastrophic Cyber Attacks: Lessons from 600,000 Routers Compromised by Mystery Malware 

Authors: Stephanie Kille​, Customer Success Manager and Austin Foster, Customer Success Manager Working in cybersecurity we have all seen our fair share of cyber...

joanna

Five ways Plixer Scrutinizer helps education networks

Spring is among us: warmer weather, blooming flowers, and the need to start monitoring on-campus university and school networks again now that students are...

jake

Forensic investigation of endpoints using NetFlow

This blog will go over how to use some of the features in Plixer Scrutinizer v19.0, such as the host index and IP groups...

how do I load balance my netflow traffic accross multiple collectors

How can I load balance my NetFlow traffic across multiple collectors?

Do you find that you are constantly modifying NetFlow configurations to balance collector workloads?  The latest release of Scrutinizer introduces an option to load balance...

jeffm

Inspecting encrypted traffic with JA3 and JA3S fingerprinting

Two years ago, I wrote a blog about tracking malware in encrypted traffic. The overall theme of that blog was that encryption has become...

ryans

Plixer Scrutinizer new UI changes

With the newest release of version 19.0.0, I’d like to go over how Plixer Scrutinizer’s UI has changed to make finding data easier. There...

jake

Detecting RDP attacks with NetFlow and metadata

An ever increasing attack vector in the healthcare industry are attacks against open or unsecured RDP connections that allow a bad actor to gain...

jake

Slickwraps breach and metadata analysis

In a new series of blogs, we will go over some recent data breaches and how metadata analysis could have helped with the detection...

briand

Top five VPN monitoring use cases

With the dramatic shift to work from home, Plixer has been working with people all over the globe to visualize VPN traffic in a...