The Hacker News — Most Popular Cyber Security, Hacking News Site: AlienVault USM

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

December 20, 2015Wang Wei
As organizations expand their IT infrastructure to match their evolving business models and meet changing regulatory requirements, they ...
How to Protect Yourself against XcodeGhost like iOS Malware Attacks

How to Protect Yourself against XcodeGhost like iOS Malware Attacks

October 19, 2015Wang Wei
Recently, Chinese iOS developers have discovered a new OS X and iOS malware dubbed XcodeGhost that has appeared in malicious versions o...
Operation Lotus Blossom APT - Elise Malware

Operation Lotus Blossom APT - Elise Malware

August 03, 2015Swati Khandelwal
Advanced Persistent Threat (APT) type attacks continue to emerge on a global scale. What makes these attacks deviate from the norm is o...
Understanding the Shared Security Model in Amazon Web Services

Understanding the Shared Security Model in Amazon Web Services

May 21, 2015Wang Wei
Security in the Amazon EC2 environment is a responsibility shared by both the end user and Amazon. This is because within this environme...
How to Detect Exploits of the GHOST Buffer Overflow Vulnerability

How to Detect Exploits of the GHOST Buffer Overflow Vulnerability

February 11, 2015Swati Khandelwal
The GHOST vulnerability is a buffer overflow condition that can be easily exploited locally and remotely, which makes it extremely dang...
How to Detect SQL Injection Attacks

How to Detect SQL Injection Attacks

September 19, 2014Swati Khandelwal
SQL Injection (SQLi) attacks have been around for over a decade. You might wonder why they are still so prevalent. The main reason is t...
AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

March 14, 2014Swati Khandelwal
IT Infrastructure of organizations is growing ever more distributed, complex and difficult to manage. To manage such networks, a log man...