The most recent content from our members.
Currently the bot shows up as "SolarWinds Service Desk" with the SolarWinds logo. It would be nice to be able to rename this bot and update the log on it to reflect each companies branding.
Microsoft has massively accelerated development of its Teams platform over the last couple of years and many organisations now use it as a major element of their day to day workflow, communications and collaboration. For our part, we have a Team whereby users can request help from the IT support team. It also acts as…
This morning I had the opportunity to participate in a podcast with my buddies and the co-hosts of Cisco's TechWiseTV Jimmy Ray Pursor and Robb Boyd. The subject was the Conficker threat and I must say that I learned a few things as Jimmy Ray really knows his bots. We also talked about the best ways to avoid bots, the…
I am receiving massive amounts of denied TCP packets and Telnet requests from outside sources EX.Russia,Germany, Netherlands,Venezuela, and some US states. These alerts are coming from a custom filter I created: "TCPTrafficAudit.DestinationMachine=Internal IP". Apart from creating geo-blocks and restrictions on my…
I set up a span port from a DNS server for our security team that was investigating possible botnet activity and came across some curious activity stemming from the server running our Solarwinds suite [NPM, NCM, NTA, SAM, et. al.]. Many of these ptr lookups were for external hosts that having nothing to do with our line of…
In an earlier blog, we saw what a blended threat is and what all elements constitute it. To quickly recap, a blended threat is a composite security threat which involves various threat vectors coordinated to launch a high-degree security exploit that’s both difficult to detect and contain. How Does a Blended Threat Work?…
It’s no surprise that security attacks are getting more complex and sophisticated to deal with. Such advancement in the technology of cyber-crime makes it paramount that IT security teams start understanding new-age threats, and equip themselves with proper strategies to counter attacks. Blended threats are one of the many…
It looks like you're new here. Sign in or register to get started.