NetFlow Ninjas Blog
POSTED BY TK Keanini on 11.20.2014
As many of us recall, the holiday season last year was marred by a slew of high-profile data breaches targeting major retailers, including the largest retail hack in U.S. history. As we gear up for Black Friday, Cyber Monday and the remainder of the holiday shopping season, it’s important that we...
POSTED BY Andrew Akers on 11.14.2014
Whether they realize it or not, all enterprises have sensitive information to protect. Valuable data such as credit card details, trade secrets, and patient information is more plentiful and accessible online today than ever before. Cyber criminals know this and are constantly developing new tools...
POSTED BY Coty Sugg on 11.14.2014
Pop quiz! What does a cyber criminal look like? What are the defining characteristics of a cyber criminal’s attire? Do they prefer hats or maybe they opt to go chapeau-less. What about their mannerisms? Are they neat, polite, and slick or maybe they’re l33t, rude, and inclined to troll YouTube...
POSTED BY Andrew Akers on 11.10.2014
After the Break-In: Lateral Movement and Visibility in Data Centers Securing the Perimeter Isn’t Enough Every year, organizations pour more and more money into network perimeter defenses. Vulnerability management, bigger and better firewalls, and intrusion prevention systems all make up the big...
POSTED BY TK Keanini on 10.30.2014
This past year, we have seen some pretty scary stuff happen in cybersecurity. Being that Halloween is almost here, I thought I would share with you some scenarios that keep me up at night. If you enjoy a good scare, read on.
POSTED BY TK Keanini on 10.27.2014
Security threats have changed tremendously in the last few decades. Instead of the smash-and-grab tactics of 20 years ago, threats are adaptive, persistent, and hard to identify. As the bad guys grow and evolve, the cyber security industry must learn and adapt to compete. A holistic approach to...
POSTED BY TK Keanini on 10.22.2014
To safeguard information that could bring harm to your organization or customers if it falls into the wrong hands, you need to be ready to respond promptly and proactively to an attack and take immediate control of the situation. One wrong click has the potential to compromise your network and data, but utilizing secure communication and promoting safe habits among users can significantly reduce the likelihood of a successful attack.
POSTED BY on 10.15.2014
Lancope Director of Security Research Tom Cross will deliver a complimentary webinar on Wednesday, October 22 at 11 a.m. ET / 8 a.m. PT to help organizations cope with ever-advancing cyber threats. On today's increasingly militarized Internet, companies, non-profits, activists and individual...
CATEGORIES: 
POSTED BY Brandon Tansey on 10.15.2014
A few short weeks ago, the details of the Shellshock vulnerability were made public. Since the bug was published, we’ve seen all kinds of scanning activity on the Internet. Some of these scans were benign scans by researchers, but others were distributing malware. We were immediately curious about...
POSTED BY Keith Wilson on 09.30.2014
In my last two posts, I’ve walked through the steps an attacker would take when performing reconnaissance and then weaponization . Today we’re going to continue our climb up the Cyber Security Kill Chain as we utilize social engineering to deliver our malware to the victim. During reconnaissance I...

Pages