What should you know about honeypots and proactive threat detection?
Nikolett Hegedüs

What should you know about honeypots and proactive threat detection?

Honeypots are a form of proactive threat detections. Proactive threat detection is the next step in improving an organization’s security posture. It has many significant advantages e.g. it provides information about the different kinds of threats attacking the organization and the possible vulnerabilities. It works like a trap A honeypot is a monitored resource that serves as a trap or a decoy against an attack or a threat. It is a security tool that helps to prevent, detect and to gather information about IT security issues. It prevents the threat from compromising its intende...
Read more
Ransomware: what is it and why is it dangerous?
Nikolett Hegedüs

Ransomware: what is it and why is it dangerous?

Nikolett Hegedüs
Let’s start with the definition. Ransomware is a kind of malware that installs itself onto an unprotected computer, encrypts some files, and asks for a certain amount of money for decryption or to not publish certain sensitive information online. It is called a denial-of-access attack and it can be very frustrating because you know that the files are there but you can’t access them.   There are two types of ransomware attacks: Simple ransomware or lockscreen, where the system is locked. The attack is more serious if the files are really encrypted. It is called a file co...
Read more
SQL Injection examined 1/2
Ferenc Barta

SQL Injection examined 1/2

Relational database, SQL, SELECT SQL is a language designed for the manipulation of relational databases and for the retrieval of information from that database. A relation most commonly looks like a chart, which can be, for example, an article.   ARTICLES ID Title Text 1 DoS abc1  2    DDoS abc2...
Read more

Our port Honeypot module is out of Beta

Nikoletta Szabo
We are happy to announce that our developers officially released the port honeypot module. The port honeypot is a perfect way to fight against zero-day attacks and many of our customers are satisfied with it because the module catches and entraps hackers who attempt to break into or scan their servers making them aware of the incoming malicious traffic. The module sets up 100 honeypots chosen randomly from the 1000 most commonly used ports and is able to detect malicious port scanning conducted by hackers.For example, it gets installed on a port where usually there should not be in...
Read more

Censys vs. BitNinja

Mariann Csorba
What is Censys? It is a search engine which allows people to search for the details on the devices and networks that compose the Internet. It uses the database of Zmap and ZGrab network scanners. Day by day, it analyses more than 4 billion IP addresses, which can be examined with the help of Censys.io. The scanning is done once a day. Censys, the Unescapable It is almost impossible to hide from it, as it finds anything, anywhere that is connected to the Internet. Along with the servers storing and serving the content of webpages, webcameras, CCTV cameras, industrial networks, prin...
Read more

Port scanning – Friend or Foe?

If you have a server connected to the Internet, you can bet that it is constantly under scanning. Web-crawlers are gathering information from websites day-by-day. No matter if you have real websites or just an admin panel deployed on the web, sooner or later, they will find the public content. You may would not even think that half of your website traffic is not exactly what you think is. Taking all website traffic, averagely 44-56% is the human-robot visitor rate. However, it varies between 63-80% most of the times (small sites ~80%, medium sites ~64%, large sites ~56%).   &...
Read more
How botnets expand and how to protect against them
George Egri

How botnets expand and how to protect against them

George Egri
A botnet is a group of infected computers (aka bots or zombie machines) controlled by a hacker, the botmaster. Botnets are a major threat for every server. They are the fundamentals of the cybercrime in the dark industry of hackers. Zombie machines can be personal computers, mobile devices or even servers. Today we will focus on botnets formed by infected linux servers. Server based botnets are especially valuable for the bad guys as servers have typically high amount of various resources like cpu, memory, and what is the most important, internet bandwidth with trusted and in many cases unr...
Read more

How bots rule the Internet – and your performance

Bots have been on the Internet for a really long time. Maybe you weren’t even born, when the first one was programmed to automate a task or pretend to be a real person. During the time, their role became more and more important. They are the majority of the internet by now. According to the latest studies, the traffic of a random website shows 56% bot traffic and only 44% human traffic. Have you ever thought  about this? Good bots – Bad bots Behind the scenes, bots hack, spam, scam, crawl and do whatever a human can do, on a bigger and automated scale. Good bots are l...
Read more