Inside Out Security
Varonis Uncovers New Malware Strains and a Mysterious Web Shell During a Monero Cryptojacking Investigation
The Varonis Security Research team recently investigated an ongoing cryptomining infection that had spread to nearly every device at a mid-size company. Analysis of the collected malware samples revealed a...
Read MoreExplore by topic:
Insider Threats: Hard Lessons From WMI Eventing and Surveillance
Last time, we explored how a hypothetical insider could use the Windows Management Interface (WMI) and its eventing system to surveil other employees. No, I’m not the first person to...
How Hackers Use OSINT to Find Business Data
Hackers do their homework when picking a target, often relying on information left publically exposed to make decisions about how to attack. Whether an OSINT researcher is a hacker looking...
What is an Insider Threat? Definition and Examples
An insider threat is a security risk that originates within the targeted organization. This doesn’t mean that the actor must be a current employee or officer in the organization. They...
What is a Security Operations Center (SOC)?
A SOC is an outsourced office that is completely dedicated to analyzing traffic flow and monitoring for threats and attacks. In today’s world of cyberattacks and data breaches, companies of...
A Practical Software Approach to Insider Threats
Insider data theft presents multiple challenges for traditional IT security. Insiders are employees who are entitled to be in the network unlike hackers. Standard perimeter security measures won’t work. But...
What is a DDoS Attack? Identifying Denial-of-Service Attacks
A Distributed Denial of Service (DDoS) attack is an attempt to crash a web server or online system by overwhelming it with data. DDoS attacks can be simple mischief, revenge,...
How to Use Netcat Commands: Examples and Cheat Sheets
The Netcat utility program supports a wide range of commands to manage networks and monitor the flow of traffic data between systems. Computer networks, including the world wide web, are...
7 Wi-Fi Security Tips: Avoid Being Easy Prey for Hackers
While Wi-Fi offers the convenience of a seamless, untethered data connection, it comes with security disadvantages that hackers love to exploit. Without knowing the tricks hackers use to target Wi-Fi...
What is CASB? All About Cloud Access Security Brokers
Cloud Access Security Brokers (CASB) are a security application that helps organizations manage and protect the data stored in the cloud. Gartner advises organizations to find a “Goldilocks” CASB solution...
California Consumer Privacy Act (CCPA) and the Future of Data Security Standards
If you’ve been following the blog, you know that the California Consumer Privacy Act, or CCPA, is set to take effect on January 1, 2020. It will establish a new...