Security Research

Attackers_Turkey

Investigating an attack originating from a Turkish IT services provider

Today we have another study case which alerted our curiosity. As usual our software ACSIA is constantly monitoring our server infrastructure and notifying us in real-time of any anomalous activity targeting our servers. This one is indeed another interesting case therefore let’s not wait long and start immediately looking into the case. Less talk more …

Investigating an attack originating from a Turkish IT services provider Read More »

botnet image illustration

A Malicious attacker disguised as a Malware Hunter

Within the space of a week we had yet another unusual case to investigate thanks to ACSIA (www.acsia.io) monitoring our systems regularly and notifying us in real time of anomalies and irregularities targeting our server infrastructure. Now lets walk through this particular case in a little detail. ACSIA notified the event as an XSS attack, …

A Malicious attacker disguised as a Malware Hunter Read More »

Investigating_Online_Botnets

Investigating Online Botnets

INVESTIGATING MALICIOUS BOTNETS ONLINE (A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data,send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software.) From Dublin to Austria …

Investigating Online Botnets Read More »

cloud-security-1

Cloud Security: Challenge your assumptions

Recent UK Government statistics found that nearly half of all UK businesses suffered a cyber breach or attack in the past 12 months. Firms holding personal data and processing money are top targets. With an average cost to the business of £3,000 for medium business and £19,000 for larger ones, the most common attacks were fraudulent …

Cloud Security: Challenge your assumptions Read More »

Scroll to Top