Blog
Blog
Software Defined Network Security Benefits
What is SDN? Traditional networking uses integrated hardware and software to direct traffic across a series of routers and switches. Originally SDN was designed to virtualize the network by separating the control plane that manages the network from the data...
TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 5
TRITON malware was first identified during an attack on a Saudi Arabian petrochemical plant facility in the year 2017 and it targets Schneider Electric’s Triconex Tricon controllers. This was the first time in history that safety instrumented systems were...
Secure Messaging
Messaging is a part of the everyday life of almost all of us. And as a form of digital communication, it is subject to security issues applying to other forms of this kind of communication. Here are some hints to improve your security in this area Only use...
TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 4
In part 4 of the TRITON tactics and technics series come the Credential Access techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can...
Social Media Privacy & Security
Social Media is a nearly unlimited pool of information about its users. For starters, there is a multitude of information available on social media platforms that the users provide willingly with premeditation but sometimes it seems they do so with little...
TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 3
In part 3 of the TRITON tactics and technics series come the Defense Evasion techniques which seek to help the malware bypass defensive tools' detection. These techniques have been mapped by MITRE ATT&CK in their universally renowned knowledge base of...
Everyday Network Security – Part 2
Continuing from last week on the topic of making a network secure for everyday use, the following recommendations are worth considering: Manage your SSID Change your network name SSID stands for Service Set Identifier and for the sake of simplicity we can...
TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 2
Today comes part 2 of the tactics, techniques, and specific threat actor activities as well as detection & mitigations for the TRITON malware in the Enterprise domain. According to the ATT&CK matrix, after the malicious actor had established initial...
Everyday Network Security – Part 1
It will probably come as no surprise and is common knowledge by now that every klick you make online can be watched, logged, analysed, aggregated, and sold for profit. Depending on where you live, ‘Big Brother’ can use this information truly oppressively,...
TRITON’s Tactics and Techniques in the Enterprise domain + mitigations – Part 1
Today we continue looking at the tactics, techniques, and specific threat actor activities as well as detection & mitigations for the TRITON malware in the Enterprise domain. As the Tactics deployed by TRITON's operators cover almost all of the Tactics...