Indicators

05/09/16 |Blog # , , ,

Talent Lab and Indicators of Compromise

The data obtained by Honeypot sensors requires manual analysis and interpretation, and in most cases cannot be used in automated tools to identify the threat in other segments of the network. It is necessary to create and demonstrate a set of data that can be used as indicators of compromise (IoC) and which is received in an automated mode. The use of this data by other automated tools should not lead to false positives.
Continue reading

0 likes no responses
20/08/15 |Research # , , , ,

Indicators of compromise as a way to reduce risk

Indicators of compromise as a way to reduce risk

Infrastructure owners must regularly check their resources for the presence of malicious components. One of the ways in which a resource may become infected is as a result of “zero-day” vulnerability exploitation by cybercriminals. In this case, the developers of security tools used to protect the information system may be as yet unaware of the new threat. At the same time, experts may be investigating incidents related to the new threat. Moreover, some findings of these investigations may already be publicly available. Continue reading

0 likes no responses
Stay up to date

Twitter
Smoking kills. And vaporizing kills too: how your e-cigarette can hack your computer. https://t.co/f57jyKRdnS
Honeypots and the Internet of Things: analysis of data harvested #IoT honeytraps https://t.co/OpLh1PUnO0
Announcing Google Capture the Flag 2017 #CTF https://t.co/UymdZDlsDg
@cucrisis "determination" = "motivation", "isolation" = "predefined_subnetwork"?
"Proposed US Bill would legalize aggressive #hackback attacks." Where I missed a strong "Attack Attribution" patent? https://t.co/vFhrb0gAQ9
Recent Comments
- Sergey to Погружение в даркнет: Снифаем выходную ноду Tor и анализируем получившийся контент
лучше заходиииииииить через тор онлайн http://torproject.online/,...
- Denis Makrushin to The problems of heterogeneous means of protection
Of course!...
- K. Olbert to The problems of heterogeneous means of protection
Insightful diagram, Denis. Would you mind if I use it in a presentation, with credit, of course?...