White Hat Computer Consulting

Solutions are only the beginning

Internet Storm Center

Subscribe to Internet Storm Center feed Internet Storm Center
Updated: 3 hours 5 min ago

Phishing via Social Media, (Fri, Jan 24th)

Fri, 01/24/2014 - 07:07
The use of social media as an attack vector is nothing new; We’ve all seen plenty of s ...(more)...

Learning from the breaches that happens to others Part 2, (Thu, Jan 23rd)

Thu, 01/23/2014 - 05:53
My last Diary piece was on the analysis of multiple similar breaches with a great deal of te ...(more)...

Learning from the breaches that happens to others, (Wed, Jan 22nd)

Wed, 01/22/2014 - 02:51
Initially when major breaches or incidents announced via the media, everyone and their pet d ...(more)...

Taking care when publishing Citrix services inside the corporate network or to the Internet, (Tue, Jan 21st)

Tue, 01/21/2014 - 16:17

Citrix has some interesting products like XenApp, which allow peo ...(more)...

You Can Run, but You Can't Hide (SSH and other open services), (Mon, Jan 20th)

Mon, 01/20/2014 - 11:35

In any study of internet traffic, you'll notice that one of the top activities of attacker ...(more)...

Anatomy of a Malware distribution campaign, (Sun, Jan 19th)

Sun, 01/19/2014 - 11:41

Starting about 10 days or so ago, a Spam campaign began targeting Pacific Gas and Energy (PG&a ...(more)...

Port 4028 - Interesting Activity, (Thu, Jan 16th)

Wed, 01/15/2014 - 19:06

Take a look at port 4028.    Thanks to Bill for sharing an analysis that concluded a ...(more)...

Pages