Get the free Shadowserver special report to see if Qakbot was on your network. If yes, the bad guys could still be on your network. Read More
Category: Operator’s Security Toolkit
Why are the top National Security Teams Yelling for you to Fix your Network?
The top National Security Teams are yelling at you to fix your network. The Joint Advisory is not a simple act of collaboration. The first 12 are highlighted for a reason. We do not know the insider reasons other than they are ACTIVELY EXOLIOTED with NOT ENOUGH ORGANIZATIONS MITIGATING that are PUTTING ORGANIZATIONS at RISK. Read More
CISOs, get your First Sergeant
Behind Every Effective CISO, a First Sergeant is Clearing the Path for the organization’s success. The way we’re setting up our CISO structure is NOT working as expected. The threats keep on coming. Organizations put their fingers in the dike, plugging security risks while exhaustingly bailing water from a sinking boat. This is a no-win Read More
Cyberwarfare is here; now what?
Cyberwarfare activities were always on the Internet. STUXNET, Google Aurora, and many other attacks were a fact of life. We had cyber attacks when Yugoslavia broke up. We have constant attacks in the Middle East. Cyberwar was part of a security practitioner’s threat model from the late ‘80s until the early 2000s. Then, cybercrime started Read More
Protect your BGP Sessions from DDoS Attacks
Networks that think they are “DDoS resilient” get surprised when their BGP Sessions go down from an easily crafted DDoS. BGP port (179) is left open to the Internet and is an easy target for a low-level attack that will knock down your BGP session. Shodan’s BGP Report 325,082 open port 179 instances (June 2023). Read More
Why Are Cybercriminals Targeting Healthcare?
Why are cybercriminals targeting healthcare when the medical community puts patients first? Why are cybercriminals taking actions that threaten people’s lives at risk? The focused cybercriminal targeting of healthcare is now an increasing cause of death. Is this data suppressed? Why? The liability insurance covering all the healthcare community’s medical care would skyrocket. The closure
New SLP DDoS amplification can overload your network
Happy Tuesday – It is the RSA conference week. That means we get vendors disclosing vulnerabilities while people are at the conference. Bitsight and Curesec uncovered a Service Location Protocol (SLP) DDoS Amplification that can be as high as 2200:1. That means an open SLP port on your network can … CISA has posted an Read More
Welcome to CyberWar & LongTerm Ramification Unleashed by Russia’s War
Cyberwar is today’s reality. We’ve moved from a world of cyber-criminal threats to an interconnected arena where any malicious activity is feasible. Cyber-Kinetic attacks that destroy, kill, and massively disrupt civil society are part of our new security threat landscape reality. Geography will not help. The massively interconnected Internet means that you are a cyberwarrior’s
IP Anti-Spoofing Research Papers
We have a long library of IP Spoofing Research papers from universities worldwide. These papers are a rich & productive field of academic study exploring the risk, technique, tools, and deployment of IP anti-spoofing throughout the Internet. This page works to collect all papers in one place. Note: The materials are sorted alphabetically. This does
Loading Spoofer to Fight DDoS
Do you run a network? Do you secure an organization? Do you build applications? Do you want DDoS Attacks to be easy? Of course not! Everyone running, securing, or building something on the Internet does not want it easy to attack that service. We’re asking people to load the Spoofer application to Fight DDoS. Loading Read More