The Hacker News — Most Popular Cyber Security, Hacking News Site: AlienVault Unified Security Management

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1
December 20, 2015Wang Wei
As organizations expand their IT infrastructure to match their evolving business models and meet changing regulatory requirements, they ...

How to Build a Successful Incident Response Plan

How to Build a Successful Incident Response Plan
November 12, 2015Wang Wei
The fight to protect your company’s data isn’t for the faint of heart. As an embattled IT warrior, with more systems, apps, and users ...

How to Protect Yourself against XcodeGhost like iOS Malware Attacks

How to Protect Yourself against XcodeGhost like iOS Malware Attacks
October 19, 2015Wang Wei
Recently, Chinese iOS developers have discovered a new OS X and iOS malware dubbed XcodeGhost that has appeared in malicious versions o...

How to Detect IE Zero-day Exploit Used to Deploy Korplug Malware

How to Detect IE Zero-day Exploit Used to Deploy Korplug Malware
September 16, 2015Wang Wei
Recently, Microsoft issued an Emergency patch for a zero-day vulnerability in Internet Explorer that is being exploited to deploy Korpl...

Operation Lotus Blossom APT - Elise Malware

Operation Lotus Blossom APT - Elise Malware
August 03, 2015Swati Khandelwal
Advanced Persistent Threat (APT) type attacks continue to emerge on a global scale. What makes these attacks deviate from the norm is o...

Understanding the Shared Security Model in Amazon Web Services

Understanding the Shared Security Model in Amazon Web Services
May 21, 2015Wang Wei
Security in the Amazon EC2 environment is a responsibility shared by both the end user and Amazon. This is because within this environme...

Tor — How to Protect Your Digital Environment?

Tor — How to Protect Your Digital Environment?
March 17, 2015Wang Wei
Are you aware of everything that your users are accessing from your environment? While most of the time, non-work-related Internet b...

How to Detect Exploits of the GHOST Buffer Overflow Vulnerability

How to Detect Exploits of the GHOST Buffer Overflow Vulnerability
February 11, 2015Swati Khandelwal
The GHOST vulnerability is a buffer overflow condition that can be easily exploited locally and remotely, which makes it extremely dang...

Keeping the Bots at Bay: How to Detect Brute Force Attacks

Keeping the Bots at Bay: How to Detect Brute Force Attacks
November 20, 2014Swati Khandelwal
Thanks to recent events involving certain celebrities’ stolen pictures, “brute-force attack” is now one of the hot buzz words making its...

The Bash Vulnerability: How to Protect your Environment

The Bash Vulnerability: How to Protect your Environment
October 23, 2014Swati Khandelwal
A recently discovered hole in the security of the Bourne-Again Shell (bash) has the majority of Unix/Linux (including OS X) admins swea...

How to Detect SQL Injection Attacks

How to Detect SQL Injection Attacks
September 19, 2014Swati Khandelwal
SQL Injection (SQLi) attacks have been around for over a decade. You might wonder why they are still so prevalent. The main reason is t...

AlienVault Releases Intrusion Detection Systems (IDS) Best Practices

AlienVault Releases Intrusion Detection Systems (IDS) Best Practices
August 20, 2014Swati Khandelwal
Network security practitioners rely heavily on intrusion detection systems (IDS) to identify malicious activity on their networks by ex...

Crowd-Sourced Threat Intelligence: AlienVault Open Threat Exchange™ (OTX)

Crowd-Sourced Threat Intelligence: AlienVault Open Threat Exchange™ (OTX)
July 14, 2014Swati Khandelwal
For years, the systems and networks that run our businesses have been secured by the efforts of IT and security practitioners acting on ...

Vulnerability Management: Think Like an Attacker to Prioritize Risks

Vulnerability Management: Think Like an Attacker to Prioritize Risks
June 04, 2014Swati Khandelwal
Attackers care about ROI – they want to accomplish their objective with the least investment of time and resources possible. The same is...