Capital One Data Breach – What should we learn from it

A few days ago, a hacker breached and accessed the personal information of 106 million Capital One credit card holders or applicants across the US and Canada, in the latest massive data breach at a large company. Capital One Financial Corp., one of the nation’s largest issuers of credit cards, said that among the information…

Wikileaks, Assange and Cyber Security

WikiLeaks founder Julian Assange was arrested at the Ecuadorian Embassy in London after Ecuador withdrew their asylum status after seven years. In response to the arrest, activist communities launched several attacks against the Ecuadorean government. Yesterday, Ecuador confirmed that over 40 million cyberattacks have hit public institutions in response to the arrest of Julian Assange….

Network Traffic Analysis (NTA)

Network Traffic Analysis (NTA) was first created and defined by Gartner as an emerging category of security solutions that use network communications as the foundational data source for detecting and investigating security threats and anomalous or malicious behaviors within that network. NTA was named one of the top 11 emerging technologies in 2017 by Gartner….

Threat and incident response – closing the loop in cyber defense

Two of the Gartner’s 2019 top 10 security projects involve threat detection response and incident response. This highlights the importance of remediation and response aspects in cyber security, they are the last steps taken to close the loop in threat and attack defenses. Threat or incident response refer to the techniques and processes as well…

Protections of NEW Variant of Petya Ransomware Using Hillstone Network’s Layered Security Solution

On Jun. 27th, 2017, The Petya ransomware is receiving worldwide attention by attacking the governments, banks, electrical systems, communication systems, enterprises, and airports in several countries. The attacking virus is the Petya ransomware variant, which spreads through combinations of the email, downloader and the worm. It exploits a vulnerability (CVE-2017-0199) through the RTF attachment in…