Threat hunting 101: Hunting with Yara rules
Guest Post: Yara rules are an easy yet important threat hunting tool for searching for malicious files in your directories.
Guest Post: Yara rules are an easy yet important threat hunting tool for searching for malicious files in your directories.
We must anticipate changes in computational capacity when choosing an encryption algorithm, but is it relevant to DNSSEC?
Asia Pacific organizations are getting better and more proactive at detecting compromises in their own network.
Guest Post: Researchers show how middleboxes and censorship infrastructure can be abused to launch reflected DoS amplification attacks over TCP.
Guest Post: Institutions that run their own recursive resolvers and route from their own AS are most susceptible to privacy risks.
Guest Post: Maintaining an accurate inventory of active IP addresses is critical for security.
Adli Wahid participated as a moderator and speaker at the ITU Global Cyberdrill 2021, held online from 15 to 23 September 2021.
Guest Post: Looking for a way to improve privacy and security of your DNS? Run it through Tor.
Computer Emergency Response Teams use a range of techniques to secure partners.
Adli Wahid presented on the APNIC Honeynet Project at Threat Con 2021, held online from 8 to 11 September 2021.