AlienVault
Follow
2949 Followers
Follow AlienVault on their other social channels!
About Us
Founded:
2007
Company Size:
201-500 employees
Company Type:
Private
AlienVault is simplifying the way organizations detect and respond to today’s ever evolving threat landscape. Our unique, award-winning approach combines the essential security controls of our all-in-one Unified Security Management platform with the power of AlienVault’s Open Threat Exchange, ...
Read more
Promoted Content
Best Practices for Office 365 Security Monitoring
Follow
9
Open Source Network Security Tools for Beginners
Download Now. With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security.In this white paper, we'll provide an overview of some of our favorite open source tools as well as tips on how to use them for network security.You'll learn about using open source tools for:Network discoveryNetwork IDSVulnerability scanningPenetration testingDownload your copy today and l ...
Follow
680
How Hackers Manipulate Email to Defraud You
Internet fraud is one of the most common motivators of cybercrime. Millions of dollars are stolen every year from victims who are tricked into initiating wire transfer payments through social engineering tactics and computer breaches. This is typically accomplished using one of three methods: business email compromise (BEC), email account compromise (EAC), and spoofing.All three of these methods can be attempted against any organization that relies on email for communication. Being a smaller com ...
Follow
24
The Shadow Brokers: What’s Next After WannaCry
Register NowThe Shadow Brokers are a hacking group who have published several leaks containing hacking tools from the National Security Agency (NSA), resulting in high profile malware attacks like the recent WannaCry ransomware attacks. So, what can we expect next as a result of the leaked hacking tools? The AlienVault Labs security research team has been analyzing the leaked information in an effort to understand potential attack vectors, and create the necessary threat intelligence update ...
Follow
27
The Cybersecurity of Persona 5
I'm not only an information security professional, I also happen to be a huge Japanese RPG fan. I've also been playing video games since 1989. The Persona spinoff of the massive Megami Tensei series is one of my favorite game franchises. Persona games feature beautiful art design by Shigenori Soejima and Masayoshi Suto, excellent music by Shoji Meguro, well written stories and characters, and compelling game mechanics.I only write professionally about cybersecurity, I'm not a video game reviewer ...
Follow
320
Threat Intelligence Evaluator’s Guide
Get Your Copy Today! Threat Intelligence is one of the most critical weapons we can use in cyber defense. Knowing which attackers are trying to target your organization, as well as how, why, and when gives you an advantage when trying to thwart these attacks.In today’s landscape, security researchers are a modern-day version of Sherlock Holmes. They’re constantly analyzing clues to an adversary’s motives and techniques, tracking down their ephemeral footprints amidst the chaos of our cyber ...
Follow
766
Insider's Guide to Incident Response – Expert Tips
Get All 5 Chapters of AlienVault’s Insider’s Guide to Incident Response in 1 eBook!The Insider’s Guide to Incident Response gives you an in-depth look at the fundamental strategies of efficient and effective incident response for security teams that need to do more with less in today’s rapidly changing threat landscape.In this guide, you’ll learn about: -Arming & Aiming Your Incident Response Team -Incident Response Process & Procedures -Types of Security Incidents -Inc ...
Follow
Diversity in Recent Mac Malware
In recent weeks, there have been some high-profile reports about Mac malware, most notably OSX/Dok and OSX.Proton.B. Dok malware made headlines due to its unique ability to intercept all web traffic, while Proton.B gained fame when attackers replaced legitimate versions of HandBrake with an infected version on the vendor’s download site. Another lower profile piece of Mac malware making the rounds is Mac.Backdoor.Systemd.1.Read the full AlienVault blog.
Follow
877
Detecting WannaCry Ransomware
Learn More“WannaCry” ransomware has hit tens of thousands of networks, bringing down hospital services, telecommunication services, financial institutions, and more.In this free white paper, you'll learn:How WannaCry infects systemsWhat you should update immediatelyHow to scan your environment for the MS17-010 vulnerabilityHow to continuously monitor your environment for intrusions and indicators of an exploitDownload this white paper now to learn how you can start using ...
Follow
71
Ongoing WannaCry Ransomware Spreading Through SMB Vulnerability
One method of command and control and secondary installation has been sinkholed by security researchers, however the attackers can still leverage a second communication mechanism via Tor.The WannaCry ransomware is using the file extension .wncry, and it also deletes the Shadow Copies, which is a technology introduced into the Microsoft platforms as far back as Windows XP and Windows Vista as the Volume Shadow Copy service. This means that even backup copies produced by this service, such as W ...
Follow
71
Best Practices for Office 365 Security Monitoring
Download NowFor many organizations, Office 365 marks an entry point into cloud computing—and with it, cloud security. As organizations migrate sensitive and business-critical data to the Microsoft cloud, many security concerns arise: Is our data secure? Who has access to it, both internally and externally? What if unauthorized users compromise account credentials? How can we detect ransomware and other malware in Office 365? What do we need to do to maintain compliance?In this whitepaper, you' ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel