Security Research

View All
April 6, 2018 0

Investigating an attack originating from a Turkish IT services provider

By ostendali

Today we have another study case which alerted our curiosity. As usual our software ACSIA is constantly monitoring our server infrastructure and notifying us in real-time of any anomalous activity targeting our servers. This one is indeed another interesting case...

March 23, 2018 0

A Malicious attacker disguised as a Malware Hunter

By ostendali

Within the space of a week we had yet another unusual case to investigate thanks to ACSIA (www.acsia.io) monitoring our...

January 30, 2018 0

Investigating Online Botnets

By Donal Kerr

INVESTIGATING MALICIOUS BOTNETS ONLINE (A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be...

January 30, 2018 0

Investigating Online Botnets

By Donal Kerr

INVESTIGATING MALICIOUS BOTNETS ONLINE (A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be…