All

Investigating Targeted Attacks

You received a call about an IP address behaving strangely and now you need to investigate the issue and start collecting details surrounding the...

How to Create Network Maps

Let’s face it: network maps are awesome.  At a glance, they provide details we need about how our network is connected, and which devices other devices...

DNS Sinkholes

Cyber threats, hackers, Botnets, malware, phishing, spam! You have most likely heard all of these buzzwords in the media or possibly read about some...

NetFlow API

Providing detailed visibility and contextual awareness into network traffic is essential to secure and optimize business operations. While NetFlow and IPFIX reporting have proven...

Elasticsearch NetFlow Integration

UPDATE: You can download our Kibana integration for Scrutinizer here: https://files.www.plixer.com/resources/configs/scrutinizer-elk.zip Our support team recently received a request for Elasticsearch NetFlow Integration. For those...

Splunk NetFlow Integration

We took some time recently to get our Splunk NetFlow integration working. Apparently, there are a few customers who are looking to get from...

Wallpart Phishing Scam Targets Artists

There are a lot of clever phishing scams out there.  One recent scam is particularly underhanded, however, as it preys on artists’ instinct to...

Lax Companies Now Legally Liable for Credit Card Theft

For too long, some companies have shirked their responsibility to protect their customer’s personal information. Furthermore, it is believed that these companies simply gave...