URL scanning for new age security measures

Posted by Eric Parker on Oct 21, 2020 8:00:00 AM

It’s the URL, stupid (me)!


Consider a scenario. You are in a miserable situation where you accidentally clicked on some phishing link or scam URL. A long time ago, when the web was safe, and viruses, trojans, and worms were transmitted only by EXE or BIN files, we could rest assured that the virus scanner protected us.

Now, the web is the purveyor of all things good and evil. Smartphones have become the norm rather than the exception. The individual security measures (windows, IOS, etc.) are only as useful as there latest update, and maintaining the amount of tech we each possess up to date is difficult. But the most common denominator is the URL centric web. All devices have Internet access and thus are vulnerable to the latest threats.

Think of the email before spam abuse. There used to be open relays everywhere, and anyone could send emails using a 10 line shell script using SMTP command verbs. Today that is impossible since email abuse has turned people away from everyday email. Even when you need to use email for work, most of one's inbox is someone trying to sell you something or market something. Every piece of traffic that humans originated on the Internet has a URL, so let's look at new-age security measures to help protect you.

Read More

Topics: Cyber Security, Network Scanning, Network Security, url scanning

Using Elasticsearch as the Back-end For Fast Prototyping

Posted by Niraj Markandey on Oct 14, 2020 8:00:00 AM

In the last article, Understanding the Elastic Stack, I broke down the various Elastic components (check it out for a quick refresher). Now we will use the REST API provided by Elasticsearch as the back-end for a simple project. But before, let us discuss why we want to use Elasticsearch REST API as back-end.

The functionality of the back-end:

Read More

Topics: Cyber Security, Elastic, elasticsearch, prototyping

How to Get Started With Tcpdump

Posted by Craig Jorgensen on Oct 7, 2020 8:00:00 AM

Introduction


We have all have heard of network analyzers or packet sniffers, Wireshark with its command-line counterpart Tshark, or tcpdump.

This article explores how Linux's command-line power, combined with the tcpdump lexical parser's filter expressions, can be used for some complex networking debugging. If you are bored at home in these COVID times, how about extracting the video of a video conference capture? (On a serious note, only do this for your video with the participants' permission.)

Read More

Topics: Cyber Security, cybersecurity, Network Security, tcpdump

The Crypto Magic Behind OpenSSL

Posted by Dhiraj Sharan on Sep 30, 2020 8:00:00 AM

We talked about introductory OpenSSL in a previous blog Dipping Our Toes into OpenSSL, that covered how it supports rich cryptographic-centric operations, which are needed for all sorts of things in the security domain and even outside of it. Today, let's take the next step and understand some of the crypto arithmetic behind it, without making the topic too complicated.

Photo by Vanna Phon on Unsplash

Read More

Topics: Cyber Security, cybersecurity, cryptography, openssl

DNS Security Implications

Posted by Craig Jorgensen on Sep 23, 2020 8:00:00 AM

DNS - Do Not think it's Simple

In our recent series of articles, we talked about network security-related tools and techniques one needs to be aware of to build a cybersecurity career. Next, we will cover DNS and its related security implications!

DNS, or Domain Name System, translates domain names to IP addresses, so your browser/s can find what you searched. DNS resolvers are usually stub resolvers, which means that the full DNS records lie elsewhere.

Read More

Topics: Cyber Security, cybersecurity, DNSSEC, DNS

Network Security with Zeek (Bro)

Posted by Craig Jorgensen on Aug 12, 2020 8:00:00 AM

Zeek the new Bro

Zeek is the new name for Bro that has been in existence since 1994. In this article, we will review the useful features of Zeek that make it a powerful tool for network analysis and security monitoring. Need a little more familiarity with Zeek? Check out our previous blog:  Bro: Security's Swiss Army Knife.

Read More

Topics: Cyber Security, cybersecurity, Bro, Zeek, Security Engineer

How to Use Netcat for Cybersecurity

Posted by Dhiraj Sharan on Aug 5, 2020 8:00:00 AM

To start a career as a security analyst, one must have a good understanding of the network and knowledge of networking tools. Let's begin with netcat.

Read More

Topics: Cyber Security, cybersecurity, netcat, Linux

Hacker Tricks

Posted by Alexis Vander Wilt on Jun 30, 2020 8:00:00 AM

Looking for some top hacking techniques? Read about the most common ones below! 

Credit to Finjan.com, for more detail on this content see the original post: https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/

Read More

Topics: Cyber Security, Ransomware, Malware, cybersecurity, Brute Force Attacks, Hacking

Checklist for Securing your home-grown IT applications

Posted by Dhiraj Sharan on Jun 9, 2020 8:00:00 AM

A software application is a program or multiple programs that help end-users. Most applications use network resources, database resources, storage, and other cloud resources, to function. This connectedness is vital to keep in mind, not only how your end user may interact with the application, but also how vulnerable the application may be to malicious actors. One may use several different methods to protect the application, but a determined attacker with sufficient resources may access your application. So, how can we secure your home-grown IT applications? 

Read More

Topics: Cyber Security, it applications, security checklist

Big Data and Cybersecurity

Posted by Alexis Vander Wilt on Jun 2, 2020 8:00:00 AM

Big data can provide numerous insights to enterprises and help professionals to make informed decisions. When used in cybersecurity, big data can find trends and correlations, flag anomalies, and recognize the malicious activity. However, malicious hackers are also benefiting.  As AI and machine learning find their way into the world of malicious cyber attacks, cybercriminals are finding new and innovative ways to attack our systems. So, does big data hold the answer to combating cybercriminals?

Read More

Topics: Cyber Security, Big Data, anomalies