Subscribe: Entries feed

Last update: 25 September 2022

ALPHA THREAT BLOGS

An exemplary learning community

Cyber Security Risks: How To Protect Your Business From Cyber Threats in 2021

  Since the pandemic, the ‘work from home’ culture has grown significantly worldwide. While working from home is convenient and has many advantages, it also poses a wide range of cyber security risks for small to medium businesses. A cyber attack not only disrupts normal operations, it can also cause serious damage to important IT assets and...

Top 7 Cyber Security Best Practices To Protect Your Organization

How can you avoid being a victim of a cyber-attack? Here are 7 cybersecurity best practices you can begin to implement today to protect yourself from cyber attacks. TIP# 1 Keep Your Softwares Up to Date Outdated softwares are easy target for attackers. They can give direct remote access to attackers in some cases. Updating softwares is the critical...

Ransomware Protection: How To Keep Your Data Safe In 2021 I Do's and Don'ts

In recent years, the purpose of ransomware attacks have evolved to target businesses by encrypting entire computer networks and files, stopping operations until payment has been received. What is Ransomware? Ransomware is a type of malicious software (malware) that threateens to report or obstructs the victim's access to their data until the...

OPEN SOURCE SECURITY CONTROLS

This post offers a list of Open source security controls to adapt. Special thanks to Adrian Grigorof for compiling this list SECURITY CONTROLS OPEN SOURCE     Firewall PfSense, IPFire, NG Firewall IPS/IDS Snort, Suricata Web Application Firewall ModSecurity, IronBee, WebKnight (MS IIS) SIEM Log Analytics SIEMonster, Elastic Stack, OSSIM Container...

APT GROUPS LIST

This post lists some commonly known APT groups of various countries CHINA Comment Crew, APT2 UPS, IXESHE APT16, Hidden Lynx Wekby, Axiom Winnti Group, Shell Crew Naikon, Lotus Blossom APT6, APT26 Mirage, NetTraveler Ice Fog, Beijing Group APT22, Suckfly APT4, Pitty Tiger Scarlet Mimic, C0d0so SVCMONDR, Wisp Team Mana Team, TEMP.Zhenbao SPIVY,...

SOCIAL ENGINEERING ATTACK TACTICS

Here we will take a peek into the creativity of attackers who always keep on trying new and creative ideas to steal your identity. This post shows some real emails received that are really creative enough to earn your trust and gain your personal information over email. Below are some emails received in our honeypots, which exposes some attack...