SIEM Success … all about selecting the right Use Cases

Unfortunately success and SIEM are not common words used in the same sentence, instead its usually failure and SIEM.  The bigger question is why? as Gartner puts it, failure to plan before buying, failure to define scope and lack of sufficient context.  When the Israeli government built their security program by implement a SIEM in […]

Why Threat Analytics needs to be Re-Engineered

To fight cyber attacks today, the threat landscape demands a different approach. Reporting and logging of events are good for compliance report generation. But, if we have to mitigate threats in real-time, we need to have systems that go beyond these. At NETMONASTERY we have had to rescue a large number of failed deployments where […]

SHELLSHOCK – Threat samples from CVE-2014-6271

To our surprise we collected nearly 23 malware samples in the 11 hrs of action starting the morning of the 26th UTC, before we could go beyond those 11hrs, we decided to attempt to document what we picked up. To draw a pre-mature conclusion “Bad actors maintain a constant state of preparedness to execute a […]

Shellshock and why should you be worried (CVE-2014-6271)

The bug dubbed as “Shellshock”, affects the Unix command shell “Bash”, which is one of the most common applications running in the *NIX systems. BASH (Bourne Again Shell) is the interpreter that allows you to orchestrate commands on Unix and Linux systems. Right now the web is buzzing with all sorts of information about Shellshock […]

LIVE-UPDATE – Shellshock CVE-2014-6271

A bug in GNU Bash affecting all versions through to 4.3 allowing remote code execution (RCE) on all vulnerable flavours of *NIX. The vulnerability allows the attacker to execute arbitrary code on a remote system via a crafted environment variables. CVSS v2 Base Score: 10.0 (HIGH) Impact Subscore: 10.0 Exploitability Subscore: 10.0 Access Vector: Network […]

1 2 3

© 2015-2016 All Rights Reserved. NETMONASTERY™ and CNAM™ is a registered trademark of NETMONASTERY NSPL.