Remove Cloud Migration Remove Encryption Remove Internet Remove Surveillance
article thumbnail

SHARED INTEL: How NTA/NDR systems get to ‘ground truth’ of cyber attacks, unauthorized traffic

The Last Watchdog

In one case, ExtraHop tracked a made-in-China surveillance cam sending UDP traffic logs , every 30 minutes, to a known malicious IP address with ties to China. But ExtraHop noticed that the tool also opening encrypted connections to vendor-owned cloud storage, a major HIPAA violation. Mukerji: Cloud is here to stay.