Security Intelligence

Recent posts by:
Israel Aloni
By now, the concept of the cyber attack chain—or kill chain—is widely accepted as a way to understand and deal with threats. The first thing that malware does once it’s established on the network is call home—reach out to a Command and Control (C&C) server. C&Cs are famous for controlling botnets, ...
Catching and investigating cyber attacks feels a bit like detective work. And whenever I think of detectives, one of my favorites comes to mind: Sherlock Holmes. The Sherlock Holmes stories are always a fun read as well as a great mental workout.  I’m always fascinated by the way Sherlock Holmes ...

Subscribe to Email Updates

Posts by Topic