How to Control DNS Traffic Load
How to Control DNS Traffic Load 3 steps to getting ahead of unpredictable traffic situations When sizing your server farm goes sideways Domain Name Service (DNS) administrators are occasionally faced...
View ArticleLearn How to Use Python to Assist with Network Forensics
Learn How to Use Python to Assist with Network Forensics Leverage Python ctypes for quick development of protocol decoders During an active incident, there typically isn’t enough time to thoroughly...
View ArticleBehind the Scenes of a Failed Phishing Attempt
Behind the Scenes of a Failed Phishing Attempt – by Steven Weinstein One of our customers recently asked us to analyze a phishing email claiming to be from Wells Fargo that was well enough crafted to...
View ArticleWhere there are Breaches, there are Infections
Where there are Breaches, there are Infections – by Jason Lewis Community Health Systems (CHS) recently announced their network of 206 Hospitals was hacked impacting the information of 4.5 million...
View ArticleHeartbleed Hack Still a Threat Six Months After Discovery
The post Heartbleed Hack Still a Threat Six Months After Discovery appeared first on LookingGlass Cyber Solutions Inc..
View ArticleDid stealing small business data motivate JPMorgan hackers?
Did stealing small business data motivate JPMorgan hackers? President Obama can only guess at the motives of the elite hacking ring that spent much of this summer probing for routes to hack into in at...
View ArticleTargeted Attacks: A Defender’s Playbook
Most cyber attacks today are random, automatically generated exploits that prey on vulnerable systems. But security experts now say there's a small but growing percentage of online attacks that are...
View ArticleFeedback Friday: Is North Korea Behind the Sony Hack?
The hackers’ activities came to light on November 24, when the computers of Sony employees started displaying an image of a skull accompanied by a warning message. The post Feedback Friday: Is North...
View ArticleSix Degrees of 3rd Party Risk From Russian Cyber Ops
Six degrees of separation is a theory that everyone in the world is six, or fewer steps, from any other person in the world. This theory was popularized through Kevin Bacon, who has been in so many...
View Article
More Pages to Explore .....