A Twisted Pair Gone Too Far
Twisted Pair Cables :These are a type of guided media. Alexander Graham Bell invented it. Twisted pair cables have two conductors, generally made up of copper, and each conductor has…
1Password discloses security incident linked to Okta breach
1Password, a popular password management platform used by over 100,000 businesses, suffered a security incident after hackers gained access to its Okta ID management tenant. “We detected suspicious activity on…
SOC Manager
SOC MANAGER: 95% false positives to scare you withIncidents at 4:45om on a FridayHas all the logs except the ones you actually need ADULT Size CostumeONE SIZE FITS MOST
Okta says its support system was breached using stolen credentials
Okta says attackers accessed files containing cookies and session tokens uploaded by customers to its support management system after breaching it using stolen credentials. “The threat actor was able to…
What is IP spoofing?
Spoofed IP packets with forged source addresses are often used in attacks to avoid detection. What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets with…
NTP amplification DDoS attack
A volumetric DDoS attack that takes advantage of a vulnerability in the NTP protocol, flooding a server with UDP traffic. What is a NTP amplification attack? An NTP amplification attack…
What is a DNS flood? | DNS flood DDoS attack
A DNS flood is a DDoS attack that aims to flood and overwhelm a target DNS server. What is a DNS Flood? Domain Name System (DNS) servers are the “phonebooks”…
Broken Keyboard – SEIM Monitoring
Steves’s Keyboard must be broken. He keeps hitting the escape key, but he’s still at work.