Detecting the New CallStranger UPnP Vulnerability With Zeek

By Ryan Victory, Corelight Security Researcher On June 8, Yunus Çadırcı, a cybersecurity senior manager at EY Turkey released a whitepaper and proof of concept code repository for a newly discovered vulnerability ...
Preventing Data Exfiltration: Definition, Examples and Best Practices

Preventing Data Exfiltration: Definition, Examples and Best Practices

As one of the biggest threats to data security, data exfiltration has the potential to result in devastating outcomes for... The post Preventing Data Exfiltration: Definition, Examples and Best Practices appeared first ...

Network traffic analysis for IR: Data exfiltration

| | data exfiltration
Introduction Understanding network behavior is a prerequisite for developing effective incident detection and response capabilities. ESG research has found that 87 percent of companies use Network... Go on to the site to ...

Cybersecurity Professionals Exhibit Risky Behavior – RSA Conference Survey

Privileged credentials are the keys to the IT kingdom. That phrase has been repeated so... The post Cybersecurity Professionals Exhibit Risky Behavior – RSA Conference Survey appeared first on Gurucul ...
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

How your screen’s brightness could be leaking data from your air-gapped computer

It may not be the most efficient way to steal data from an organisation, let alone the most practical, but researchers at Ben-Gurion University in Israel have once again detailed an imaginative ...

The 2020 Insider Threat Report is Here

More than ever, organizations are under continuous cyberattack from nation-state and professional criminal hackers. So,... The post The 2020 Insider Threat Report is Here appeared first on Gurucul ...

Be afraid … Be very afraid

It seems ironic that Halloween marks the final day of National Cybersecurity Awareness Month (NCSAM). The... The post Be afraid … Be very afraid appeared first on Gurucul ...

Cybersecurity Horror Stories Don’t Have to Keep You Up at Night

Iconic filmmaker John Carpenter once said this about horror flicks: “There are two different stories... The post Cybersecurity Horror Stories Don’t Have to Keep You Up at Night appeared first on Gurucul ...
XKCD User Forum Data Breach

XKCD User Forum Data Breach

Bad news for XKCD user forum members - all 562,000 of them - reports Sergiu Gatlan (writing for Bleeping Computer) in a blog post on September 3rd; as email addresses, user names ...
LinkedIn's Bad Behaviors, The Data Exfiltration Gambit

LinkedIn’s Bad Behaviors, The Data Exfiltration Gambit

Bad Behaviors should not be tolerated... Behold, and examine, if you will, the data exfiltrated (in this case, the inventory of extensions installed in your broweser, and data contained therein) by Linkedin ...