infosec

1 October 2013 at 12:03pm
Category Count Compromise 128 Copyright 1 Denial of Service 4 General Query 2 LEA Query 2 Legal/Policy Query 0 Malware 420 Net/Security Query 4 Other 11 Phishing 49 Scanning 30 Social Engineering 0
1 October 2013 at 12:00pm
Category Count Compromise 111 Copyright 3 Denial of Service 7 General Query 8 LEA Query 5 Legal/Policy Query 3 Malware 336 Net/Security Query 8 Other 16 Phishing 44 Scanning 45 Social Engineering 0
1 October 2013 at 11:58am
Category Count Compromise 74 Copyright 3 Denial of Service 9 General Query 7 LEA Query 2 Legal/Policy Query 1 Malware 567 Net/Security Query 12 Other 11 Phishing 36 Scanning 26 Social Engineering 1
16 September 2020 at 4:01pm
You may be aware of the launch by the government of CISP - the Cyber Security Information Sharing Partnership. It's a web based environment in which various sector communities can come together to share information and collaborate on common threats and incidents. The focus is very much on operations and people who are in positions to take action to defend their organisations. There's a framework based on the Traffic Light Protocol for how far information can be shared.
11 June 2013 at 10:00am
Microsoft's recent take down of domains related to Citadel (a varient of Zeus) botnets has unfortunatly also taken down a number of sinkhole domains that were being used by researchers to monitor and report on Citadel infections. As a result of this our reporting of Citadel and Zeus infections may see a drop in the coming weeks. Any decrease in the number of infections seen at a particular site may be due to this lack of visibility.
11 June 2013 at 9:57am
Category Count Compromise 74 Copyright 3 Denial of Service 10 General Query 16 LEA Query 4 Legal/Policy Query 1 Malware 334 Net/Security Query 34 Other 39 Phishing 22 Scanning 31 Social Engineering 1
11 June 2013 at 9:55am
Category Count Compromise 271 Copyright 1 Denial of Service 13 General Query 12 LEA Query 3 Legal/Policy Query 1 Malware 277 Net/Security Query 4 Other 16 Phishing 21 Scanning 77 Social Engineering 0
28 March 2013 at 9:31am
Category Count Compromise 22 Copyright 22 Denial of Service 10 General Query 3 LEA Query 1 Legal/Policy Query 1 Malware 268 Net/Security Query 3 Other 13 Phishing 28 Scanning 27 Social Engineering 0
12 February 2013 at 10:04am
Denial of service (DOS) attacks are comparatively rare amongst the types of security incidents that are reported to Janet. The majority of DOS attacks are unsophisticated and subsequently short-lived, causing only minor issues for us due to our network capacity.
Subscribe to infosec