Have you seen the Shadowserver Dashboard? Did you know it provides critical information on what people outside your network can see into your network? Did you know that the Dashboard and free reports can save your network …. all you need to do is track down the exposure and fix it (before the criminals use Read More
Tag: Shadowserver
Loading Spoofer to Fight DDoS
Do you run a network? Do you secure an organization? Do you build applications? Do you want DDoS Attacks to be easy? Of course not! Everyone running, securing, or building something on the Internet does not want it easy to attack that service. We’re asking people to load the Spoofer application to Fight DDoS. Loading Read More
Bad Guys are Scanning Your Network!
Bad guys are scanning your network. They are finding all the vulnerabilities exposed to the Internet. The vulnerable systems, critical devices, and other ways to break into your network. When ransomware, malware, botnets, and other break-ins happen, people wonder, “how did the threat actors find that service?” People thought that “if we don’t publish it, Read More
US Warns Ransomware Threats during Holidays – Whoops! Too Late
If you are reading about potential ransomware threats during the holidays, just know it is too late. By the time you get a call waking you up on a labor day holiday break, it would be too late to stop the ransomware threat. People forget that ransomware is the monetization network break-in. The THREAT is Read More
Securing Your Network Using Shadowserver’s Daily Network Reports
Securing your Network using Shadowserver Reports helps organizations learn about this unique public benefit tool. What if there was a public benefit, free to use, security report that provided you a complete overview of your security risk? What if this tool allowed you to see what the bad guys are seeing on your network? What
Protect Your Network from an Internet Worm during COVID-19
Do you want a repeat of Wanacry? Do you want an Internet Impacting Worm in the middle of the COVID-19 Crisis? All organizations can take two steps to minimize the risk of a potential Internet worm. First, they can deploy an access-lists on the edge of their network that block TCP/UDP port 445. This can Read More
Conficker – the “Fortunate 500”
Conficker has been a dual edge sword to the industry. On one hand, it a nasty “weapons grade” hijacking malware with nefarious consequences – ranging from a platform for crime to a threat Global Telecom’s, SCADA, and other critical infrastructure. On the other hand, it is an example of what cyber-civic society can do when Read More