Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Networks

How to Change Your Wi-Fi Password for Advanced Online Security

Home is where the Wi-Fi is, and where your network can be the target of network attacks. Although many of us know the importance of creating strong passwords to protect our email, social media, online banking, etc., few people apply the same practice to their Wi-Fi passwords. Using the default password provided by your Internet Service Provider (ISP) might seem convenient, but it has risks.

Network Security and Application Security: The Power Duo of Cybersecurity

In a world with frequent technological changes, maintaining the trustworthiness and protection of your data and systems should be of paramount importance. With technology constantly evolving for the better, dangers and susceptibility could also make your online security more extraordinary. This is where the issues of network security and application security appear, which may be referred to as two complementary subtopics.

Optimizing Wireshark in Kubernetes

In Kubernetes, managing and analyzing network traffic poses unique challenges due to the ephemeral nature of containers and the layered abstraction of Kubernetes structures like pods, deployments, and services. Traditional tools like Wireshark, although powerful, struggle to adapt to these complexities, often capturing excessive, irrelevant data – what we call “noise.”

The Cyber Security Risks of The Remote Work Revolution

The COVID-19 pandemic kickstarted a seismic shift in how we work, transforming remote work from a niche arrangement to a mainstream necessity. While this shift has unlocked numerous benefits such as increased flexibility, reduced commute times, and enhanced work-life balance, it has also exposed organisations to a new array of cyber security risks. Cyber attacks were expected to have cost the world $8 trillion USD in 2023, with that number expected to rise to $9.5 trillion in 2024 and $10.5 trillion in 2025.

Unmasking the Challenges of Blocking Malicious IP Addresses: Overcoming the Unknown

In the ever-evolving threat landscape, identifying and blocking malicious IP addresses is an essential defense mechanism. However, this task presents unique challenges that demand careful consideration and innovative approaches. Unlike domain names, the registration details for IP addresses are less transparent, making it more challenging to access ownership information, registration dates, and the responsible parties.

The benefits of DDI solutions for modern data center networks

Data center networks are the backbone of today’s digital economy, powering everything from cloud services to big data analytics. In today’s fast-paced digital environment, the rise of mobile apps, the 5G revolution, and the advancement of technologies like IoT and AI are reshaping the demands on technology infrastructure. This has led to a heightened need for data centers that are scalable, flexible, resilient, and efficient.

Detecting the STRRAT Malware Family

In this edition of Corelight’s Hunt of the Month blog, we bring you a STRRAT malware detector. In recent months STRRAT has become one of the top malware families submitted to Any.Run’s malware sandbox: STRRAT is a Java-based remote access tool (RAT) that uses a plugin architecture to provide full remote access to an attacker, as well as credential stealing, key logging, and additional plugins.

The Best VPN Alternative for Businesses

Virtual Private Networks (VPNs) are used by businesses to secure remote access to systems and encrypt employees’ internet traffic. However, while VPNs add some level of protection for distributed workforces, they aren’t enough to keep your business and employees safe from common cyber threats since they make internal tracking of users complex, lack adequate protection and don’t scale in a remote work environment.