Messaggi recenti: Emilio Souberan

How to Perform a Network Audit

What Is network auditing? Network auditing refers to the process of gathering, analyzing, and studying network data, with the purpose of assessing the network’s health. Network auditing gives businesses insight into how successful their network control and management operations are, particularly regarding both internal and external compliance regulations. https://www.n-able.com/blog/how-to-perform-network-audit  
Read more

ENISA THREAT LANDSCAPE 2022

This is the tenth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape. It identifies the top threats, major trends observed with respect to threats, threat actors and attack techniques, as well as impact and motivation analysis. It also describes relevant mitigation measures. This year’s…
Read more

Microsoft detects massive surge in Linux XorDDoS malware activity

A stealthy and modular malware used to hack into Linux devices and build a DDoS botnet has seen a massive 254% increase in activity during the last six months, as Microsoft revealed today. https://www.bleepingcomputer.com/news/security/microsoft-detects-massive-surge-in-linux-xorddos-malware-activity/
Read more

NIST – Guide to Computer Security Log Management

A log is a record of the events occurring within an organization’s systems and networks. Logs are composed of log entries; each entry contains information related to a specific event that has occurred within a system or network. Many logs within an organization contain records related to computer security. These computer security logs are generated…
Read more

Recenti commenti Emilio Souberan

Nessun commento da parte Emilio Souberan ancora.