Network Security Blog
Welcome to the Nordstar Group blog, your go-to destination for expert insights, practical tips, and engaging content. Explore a world of IT knowledge and valuable information as we dive into a wide range of topics that matter to you.
FBI issues specific warning of pending attack
"ATM Cash Out" operations hinges of massive phishing operation Fortune Magazine and KrebsOnSecurity detail warnings issued by the FBI of a pending "ATM Cash Out" attack. Highly organized crime operations are poised to execute a worldwide attack across small to medium...
World-Class Breach Detection
Powerfully simple threat hunting software. Easily identify and investigate hidden threats within your network. Infocyte HUNT® automates and simplifies threat hunting — traditionally, a specialized knowledge and services-heavy process — making it easier for security...
ALERT: Fax Machines Targeted By Hackers
Hackers are targeting your old fax machines, Israeli cybersecurity firm warns Check Point: Security flaws in 45 million business fax machines worldwide could be used as a backdoor into otherwise protected networks LONDON (AP) — What could be less threatening than the...
Atlanta Didn’t Pay Ransom, But Spends $17M on Cleanup, New Devices, Better Security
Since the massive March 22nd SamSam ransomware attack against the City of Atlanta, nearly $17 million has been spent on cleanup, new devices, and better security. Read more about the Atlanta SamSam infection here - http://bit.ly/NSG_20180806 While this is certainly...
Penetration Testing vs. Vulnerability Scanning
I often see promotional emails offering penetration testing for a ridiculously low price. This should be a red flag to anyone that receives something like this. What they are actually selling is usually a vulnerability assessment and that is quite a different thing...
Russian Phishing Techniques – How did they get caught?
On Friday, July 13, Special Counsel Robert Mueller, as part of his investigation into interference with the 2016 presidential election, charged 12 Russian military intelligence officers with conducting “large-scale cyber operations to interfere with the 2016...