infosec

27 February 2014 at 11:27am
The first public draft of the Government's Implementation Profile for Basic Cyber Hygiene is available for comment on the BSI website.
19 February 2014 at 9:35am
We've disabled our monitoring of netflow feeds for W32/Conficker/Downadup infections. Given the decreasing number of vulnerable systems, the wide awareness of this issue and the low threat posed by the malware we've decided it was no longer worth the effort and resources to maintain a system that was generating a handful of alerts each day. Our reports of infections will continue, but they'll only be sourced from data sent to us by third parties such as Shadowserver.
Network time protocol (ntp) servers are regularly being used to reflect and amplify spoofed UDP packets towards the target of a DDoS attack. Attacks are growing in size and frequency and sometimes even cause issues for the organisations hosting the reflectors. Servers offering the 'monlist' command are particularly troublesome and can provide a huge amplification affect.
6 February 2014 at 9:55am
Category Count Compromise 9 Copyright 1 Denial of Service 149 General Query 9 LEA Query 4 Legal/Policy Query 1 Malware 422 Net/Security Query 19 Other 17 Phishing 30 Scanning 15 Social Engineering 0
6 February 2014 at 9:47am
On Tuesday I had the opportunity to read and provide feedback on the first draft of the government's "Implementation Profile for Basic Cyber Hygiene". This document comes as a result of their consultation last year on "Cyber security organisational standards".
21 January 2014 at 8:42am
Category Count Compromise 152 Copyright 2 Denial of Service 16 General Query 6 LEA Query 1 Legal/Policy Query 1 Malware 618 Net/Security Query 4 Other 11 Phishing 14 Scanning 14 Social Engineering 0
The statistics provided by Jisc's Janet network CSIRT require a degree of interpretation. Often the numbers are influenced more by the team's activities than they are by external influences. For example: an increase in the number of malware incidents may indicate increasing infections, but it is just as likely to be due to increased detection rates by CSIRT.
5 December 2013 at 4:09pm
You can call CSIRT for help   If you suspect that your institution is suffering from a DDoS attack you can call on Janet CSIRT for assistance. We can help you understand and analyse the traffic, and in most cases can work with our network operations centre and transit partners to filter traffic. Where possible we work with other network providers to eliminate the sources of the attack.  
3 December 2013 at 4:40pm
Category Count Compromise 366 Copyright 2 Denial of Service 14 General Query 9 LEA Query 4 Legal/Policy Query 0 Malware 544 Net/Security Query 2 Other 12 Phishing 95 Scanning 20 Social Engineering 1
1 October 2013 at 12:05pm
Category Count Compromise 7 Copyright 0 Denial of Service 9 General Query 4 LEA Query 1 Legal/Policy Query 0 Malware 424 Net/Security Query 2 Other 17 Phishing 33 Scanning 18 Social Engineering 1
Subscribe to infosec