CSIRT

18 April 2013 at 11:12am
Category Count Compromise 30 Copyright 17 Denial of Service 13 General Query 3 LEA Query 2 Legal/Policy Query 1 Malware 287 Net/Security Query 7 Other 9 Phishing 26 Scanning 39 Social Engineering 0
28 March 2013 at 9:31am
Category Count Compromise 22 Copyright 22 Denial of Service 10 General Query 3 LEA Query 1 Legal/Policy Query 1 Malware 268 Net/Security Query 3 Other 13 Phishing 28 Scanning 27 Social Engineering 0
12 February 2013 at 10:02am
Category Count Compromise 87 Copyright 33 Denial of Service 9 General Query 8 LEA Query 2 Legal/Policy Query 0 Malware 296 Net/Security Query 7 Other 19 Phishing 25 Scanning 31 Social Engineering 1
7 February 2013 at 4:34pm
The European Commission’s Cyber Security Strategy aims to ensure that Europe benefits from a “robust and innovative Internet”. The Strategy has five priorities:
7 February 2013 at 8:45am
At last week’s TF-CSIRT meeting, Gavin Reid from Cisco suggested that we may have been over-optimistic about how much technology can do to detect and prevent incidents. Automated incident prevention systems can be effective at detecting and preventing automated attacks but are less effective against targeted attacks that use human intelligence rather than brute force. In the worst case an organisation that relies too much on automation may end up designing its security stance to suit the available automation systems, rather than the other way around.
8 January 2013 at 1:25pm
Category Count Compromise 122 Copyright 89 Denial of Service 1 General Query 6 LEA Query 6 Legal/Policy Query 0 Malware 345 Net/Security Query 3 Other 8 Phishing 7 Scanning 31 Social Engineering 0
12 December 2012 at 11:44am
Category Count Compromise 208 Copyright 97 Denial of Service 4 General Query 9 LEA Query 1 Legal/Policy Query 0 Malware 364 Net/Security Query 9 Other 8 Phishing 17 Scanning 52 Social Engineering 0
16 November 2012 at 7:58am
Category Count Compromise 56 Copyright 173 Denial of Service 4 General Query 10 LEA Query 4 Legal/Policy Query 2 Malware 369 Net/Security Query 8 Other 10 Phishing 19 Scanning 91 Social Engineering 2
13 November 2012 at 4:43pm
An interesting paper from ENISA and the NATO Cyberdefence Centre illustrates the narrow space that the law allows for incident response, and the importance of ensuring that new laws don’t prevent incident response teams from protecting networks, systems, their users and information against attack.
24 September 2012 at 3:51pm
Category Count Compromise 100 Copyright 32 Denial of Service 5 General Query 3 LEA Query 8 Legal/Policy Query 0 Malware 101 Net/Security Query 6 Other 9 Phishing 19 Scanning 37 Social Engineering 0
Subscribe to CSIRT