Network Security 15/February/2024 What is DoS? How to defend yourself? Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks represent a constant threat to global enterprises, with alarming numbers of incidents. In addition to the direct losses caused by the interruption of services, companies face a new form of attack: Ransom DDoS (RDDoS), where attackers demand payment to cease attacks
THREAT INTELLIGENCE 20/December/2022 New Chaes campaign uses Windows Management Instrumentation Command-Line Utility Tempest's Threat Intelligence team recently identified a new campaign by the Chaes malware operators, in which there's a heavy use of Windows Management Instrumentation Command-Line Utility (WMIC) during the infection phase and in the theft of victim data
Detection Engineering 09/November/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 5 of 5 Intrusion Detection using Generative Adversarial Networks
Detection Engineering 26/October/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 4 of 5 Intrusion Detection using Autoencoders
Detection Engineering 13/October/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 3 of 5 One-Class Novelty Detection Intrusion Detection Systems
Detection Engineering 18/August/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 2 of 5 Clustering-Based Unsupervised Intrusion Detection Systems
Detection Engineering 23/June/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 1 of 5 Signature vs. Anomaly-Based Intrusion Detection Systems
Web Application Security 06/November/2020 Let’s go with Cross Site Request Forgery? According to a survey carried out by OWASP in 2013, CSRF was on the list of the 10 most common vulnerabilities founded in Web applications.
Cryptography 12/December/2019 Evil Maid: Attack on computers with encrypted disks The attack allows to obtain data stored on a disk or even to gain remote access to the victim’s computer
News 28/March/2018 A false Android app is being used to spy on Iranian citizens The malware used in this campaign infects Android users through a fake version of a VPN application called Psiphon
Intelligence 01/February/2018 One third of the Internet was under DoS attack, according to study Six university researchers shed some light on this type of attack
News 13/September/2017 Artificial Intelligence techniques can be used to automate false reviews on websites, study suggests The technique is presented as the next evolution of a practice known as “crowdturfing”
News 30/June/2017 Study assesses risks and implications of cyber attacks on nuclear defense systems Document examines the possibilities of cyberattack to the Trident— britain nuclear deterrent program
Network Security 15/February/2024 What is DoS? How to defend yourself? Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks represent a constant threat to global enterprises, with alarming numbers of incidents. In addition to the direct losses caused by the interruption of services, companies face a new form of attack: Ransom DDoS (RDDoS), where attackers demand payment to cease attacks
THREAT INTELLIGENCE 20/December/2022 New Chaes campaign uses Windows Management Instrumentation Command-Line Utility Tempest's Threat Intelligence team recently identified a new campaign by the Chaes malware operators, in which there's a heavy use of Windows Management Instrumentation Command-Line Utility (WMIC) during the infection phase and in the theft of victim data
Detection Engineering 09/November/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 5 of 5 Intrusion Detection using Generative Adversarial Networks
Detection Engineering 26/October/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 4 of 5 Intrusion Detection using Autoencoders
Detection Engineering 13/October/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 3 of 5 One-Class Novelty Detection Intrusion Detection Systems
Detection Engineering 18/August/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 2 of 5 Clustering-Based Unsupervised Intrusion Detection Systems
Detection Engineering 23/June/2022 Empowering Intrusion Detection Systems with Machine Learning – Part 1 of 5 Signature vs. Anomaly-Based Intrusion Detection Systems
Web Application Security 06/November/2020 Let’s go with Cross Site Request Forgery? According to a survey carried out by OWASP in 2013, CSRF was on the list of the 10 most common vulnerabilities founded in Web applications.
Cryptography 12/December/2019 Evil Maid: Attack on computers with encrypted disks The attack allows to obtain data stored on a disk or even to gain remote access to the victim’s computer
News 28/March/2018 A false Android app is being used to spy on Iranian citizens The malware used in this campaign infects Android users through a fake version of a VPN application called Psiphon
Intelligence 01/February/2018 One third of the Internet was under DoS attack, according to study Six university researchers shed some light on this type of attack
News 13/September/2017 Artificial Intelligence techniques can be used to automate false reviews on websites, study suggests The technique is presented as the next evolution of a practice known as “crowdturfing”
News 30/June/2017 Study assesses risks and implications of cyber attacks on nuclear defense systems Document examines the possibilities of cyberattack to the Trident— britain nuclear deterrent program