botnet image illustration

A Malicious attacker disguised as a Malware Hunter

Within the space of a week we had yet another unusual case to investigate thanks to ACSIA (www.acsia.io) monitoring our systems regularly and notifying us in real time of anomalies and irregularities targeting our server infrastructure. Now lets walk through this particular case in a little detail. ACSIA notified the event as an XSS attack, …

A Malicious attacker disguised as a Malware Hunter Read More »

Data_Collection_masking_as_research

Data Collection masking as research – a journey to the source of an attack targeting our web server.

Today our security product, ACSIA (www.acsia.io) detected numerous attacks but one in particular took our attention. The attack originated from Chicago Illinois and it seemed to resolve to a legitimate company called “SecurityScorecard” – www.securityscorecard.com – a security risk rating company. Usually in the majority of attacks that we see, people launch random and mass …

Data Collection masking as research – a journey to the source of an attack targeting our web server. Read More »

Botnet-HITN

ACSIA Capturing Sophisticated BotNet Attacks Originating From Dallas – USA

  With all the excitement of our first Release Candidate launch last week, it’s nice to step back and get some feedback from our system. We have deployed ACSIA to monitor a number of our  internal monitoring systems while we continue development and improvement – after checking in on our system left running over the …

ACSIA Capturing Sophisticated BotNet Attacks Originating From Dallas – USA Read More »

acsia

The 4Securitas Team is proud to announce the first release candidate of ACSIA RC v0.1.

ACSIA Release Candidate v0.1 The 4Securitas Team is proud to announce the first release candidate of ACSIA RC v0.1. What is ACSIA? ACSIA is an Automated Cyber Security Interactive Application which enables organizations to protect themselves against malicious attacks and unauthorized entities. A ‘SIEM Plus’, a real-time automated interactive cyber security monitoring and cyber defence …

The 4Securitas Team is proud to announce the first release candidate of ACSIA RC v0.1. Read More »

Investigating_Online_Botnets

Investigating Online Botnets

INVESTIGATING MALICIOUS BOTNETS ONLINE (A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data,send spam, and allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software.) From Dublin to Austria …

Investigating Online Botnets Read More »

Small_Company_Cyber_security

Cyber security: an important issue for small businesses

We examine why companies are continuing to fall victim to cyber attacks despite increased awareness of such threats, and gives us some proactive steps companies can take to avoid such security breaches. Why informed companies continue to get hacked Recent UK Government statistics found that nearly half of all UK businesses suffered a cyber breach …

Cyber security: an important issue for small businesses Read More »

cloud-security-1

Cloud Security: Challenge your assumptions

Recent UK Government statistics found that nearly half of all UK businesses suffered a cyber breach or attack in the past 12 months. Firms holding personal data and processing money are top targets. With an average cost to the business of £3,000 for medium business and £19,000 for larger ones, the most common attacks were fraudulent …

Cloud Security: Challenge your assumptions Read More »

Scroll to Top