Remove Blog Remove Cybersecurity Remove DNS Remove Threat Detection
article thumbnail

Stories from the SOC – DNS recon + exfiltration

CyberSecurity Insiders

Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for AT&T Managed Threat Detection and Response customers. The post Stories from the SOC – DNS recon + exfiltration appeared first on Cybersecurity Insiders.

DNS 54
article thumbnail

Why Small and Medium Sized Businesses Need More Than Just an AntiVirus Solution

Security Boulevard

Given this additional pressure, SMBs are being forced to make cybersecurity a serious priority. Thankfully, nearly all malware depends on DNS at some point in their kill chain, making the protocol a critical vector for shutting down these threats. In this new environment, the bare minimum is no longer good enough.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Proactive Intelligence: A Paradigm Shift In Cyber Defense

Security Boulevard

Traditionally, cybersecurity has been a reactive game: We respond to cyber threats as they arise, analyze the incidents, add pertinent information to “deny lists”, and update stakeholders on “what happened.” I firmly believe that the future of cybersecurity is a proactive approach to cybersecurity.

DNS 86
article thumbnail

HYAS Threat Intel Report May 20 2024

Security Boulevard

Weekly Threat Intelligence Report Date: May 20, 2024 Prepared by: David Brunsdon, Threat Intelligence - Security Engineer, HYAS Cyber Threat Intelligence Analysis This week in the HYAS Insight threat intelligence platform, we found a concerning open directory hosting multiple pieces of malware. Malware Analysis 1.

DNS 59
article thumbnail

Who’s Hacking You?

Webroot

In that spirit, we put together this blog post to explain the different hacker types and methods they use against us. DNS (Domain Name System) is especially vulnerable. One of the most common methods of infiltration includes internet-based attacks, such as Denial of Service (DoS), Distributed Denial of Service (DDoS) and DNS poisoning.

Hacking 115
article thumbnail

Strengthening Cyber Resilience: A Milestone Partnership

Security Boulevard

Our alliance with ZainTECH represents a convergence of expertise and vision, underpinned by a steadfast commitment to excellence in cybersecurity. At HYAS, we are deeply committed to empowering organizations with the solutions they need to get proactive against the ever-evolving threat landscape. Full forward!

article thumbnail

PCI DSS reporting details to ensure when contracting quarterly CDE tests

CyberSecurity Insiders

This is the second blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. The post PCI DSS reporting details to ensure when contracting quarterly CDE tests appeared first on Cybersecurity Insiders.