Wikileaks, Assange and Cyber Security

WikiLeaks founder Julian Assange was arrested at the Ecuadorian Embassy in London after Ecuador withdrew their asylum status after seven years. In response to the arrest, activist communities launched several attacks against the Ecuadorean government. Yesterday, Ecuador confirmed that over 40 million cyberattacks have hit public institutions in response to the arrest of Julian Assange….

Network Traffic Analysis (NTA)

Network Traffic Analysis (NTA) was first created and defined by Gartner as an emerging category of security solutions that use network communications as the foundational data source for detecting and investigating security threats and anomalous or malicious behaviors within that network. NTA was named one of the top 11 emerging technologies in 2017 by Gartner….

Threat and incident response – closing the loop in cyber defense

Two of the Gartner’s 2019 top 10 security projects involve threat detection response and incident response. This highlights the importance of remediation and response aspects in cyber security, they are the last steps taken to close the loop in threat and attack defenses. Threat or incident response refer to the techniques and processes as well…

Protections of NEW Variant of Petya Ransomware Using Hillstone Network’s Layered Security Solution

On Jun. 27th, 2017, The Petya ransomware is receiving worldwide attention by attacking the governments, banks, electrical systems, communication systems, enterprises, and airports in several countries. The attacking virus is the Petya ransomware variant, which spreads through combinations of the email, downloader and the worm. It exploits a vulnerability (CVE-2017-0199) through the RTF attachment in…

Detection of the Locky Ransomware with Hillstone iNGFW

The Characteristics of the Locky Ransomware Locky is a ransomware that is usually contained within a Microsoft Word document sent by email as an attachment – often as an invoice – to large numbers of recipients using a massive spam campaign. Locky has spread rapidly since its first appearance and has infected thousands of computers…