ostendali

Startup Lighthouse Mission to Israel

Mission to Israel – Initiative organize by Startup Lighthouse Startup Lighthouse is committed to developing cross border connections within and beyond Europe. The project lights the way for startups within Europe by organising 8 Deep Dive Weeks in 4 ecosystems, meeting over 1,600 different ecosystem players in specific themes and culminating with a Lighthouse Award …

Startup Lighthouse Mission to Israel Read More »

Capturing Next Generation Malwares that a Malicious User was Trying to Deploy

We have been very busy with the continuous development of ACSIA – one of the reasons why we have been very quiet on our blog for last months. Today I just have had an hour break and decided to dig into one particular incident that has been notified by ACSIA. This specific incident was not …

Capturing Next Generation Malwares that a Malicious User was Trying to Deploy Read More »

etherum

Ethereum cryptocurrency hacked over 20 million value.

https://thehackernews.com/2018/06/ethereum-geth-hacking.html?utm_source=dlvr.it&utm_medium=linkedin&m=1 As Bruce Schneier, security expert, notes “the security mindset involves thinking about how things can be made to fail. It involves thinking like an attacker, an adversary or a criminal. You don’t have to exploit the vulnerabilities you find, but if you don’t see the world that way, you’ll never notice most security problems.” …

Ethereum cryptocurrency hacked over 20 million value. Read More »

Attackers_Turkey

Investigating an attack originating from a Turkish IT services provider

Today we have another study case which alerted our curiosity. As usual our software ACSIA is constantly monitoring our server infrastructure and notifying us in real-time of any anomalous activity targeting our servers. This one is indeed another interesting case therefore let’s not wait long and start immediately looking into the case. Less talk more …

Investigating an attack originating from a Turkish IT services provider Read More »

botnet image illustration

A Malicious attacker disguised as a Malware Hunter

Within the space of a week we had yet another unusual case to investigate thanks to ACSIA (www.acsia.io) monitoring our systems regularly and notifying us in real time of anomalies and irregularities targeting our server infrastructure. Now lets walk through this particular case in a little detail. ACSIA notified the event as an XSS attack, …

A Malicious attacker disguised as a Malware Hunter Read More »

Data_Collection_masking_as_research

Data Collection masking as research – a journey to the source of an attack targeting our web server.

Today our security product, ACSIA (www.acsia.io) detected numerous attacks but one in particular took our attention. The attack originated from Chicago Illinois and it seemed to resolve to a legitimate company called “SecurityScorecard” – www.securityscorecard.com – a security risk rating company. Usually in the majority of attacks that we see, people launch random and mass …

Data Collection masking as research – a journey to the source of an attack targeting our web server. Read More »

Botnet-HITN

ACSIA Capturing Sophisticated BotNet Attacks Originating From Dallas – USA

  With all the excitement of our first Release Candidate launch last week, it’s nice to step back and get some feedback from our system. We have deployed ACSIA to monitor a number of our  internal monitoring systems while we continue development and improvement – after checking in on our system left running over the …

ACSIA Capturing Sophisticated BotNet Attacks Originating From Dallas – USA Read More »

acsia

The 4Securitas Team is proud to announce the first release candidate of ACSIA RC v0.1.

ACSIA Release Candidate v0.1 The 4Securitas Team is proud to announce the first release candidate of ACSIA RC v0.1. What is ACSIA? ACSIA is an Automated Cyber Security Interactive Application which enables organizations to protect themselves against malicious attacks and unauthorized entities. A ‘SIEM Plus’, a real-time automated interactive cyber security monitoring and cyber defence …

The 4Securitas Team is proud to announce the first release candidate of ACSIA RC v0.1. Read More »

Investigating_Online_Botnets

Investigating Online Botnets

INVESTIGATING MALICIOUS BOTNETS ONLINE (A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data,send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software.) From Dublin to Austria …

Investigating Online Botnets Read More »

Small_Company_Cyber_security

Cyber security: an important issue for small businesses

We examine why companies are continuing to fall victim to cyber attacks despite increased awareness of such threats, and gives us some proactive steps companies can take to avoid such security breaches. Why informed companies continue to get hacked Recent UK Government statistics found that nearly half of all UK businesses suffered a cyber breach …

Cyber security: an important issue for small businesses Read More »

Scroll to Top