What is File Integrity Monitoring? Tools, open source, best practices explained
Author: Jim Hansen


What is File Integrity Monitoring? Tools, open source, best practices explained
We hear a lot in the news today about how important it is to make sure that critical files have not been tampered with – whether its malware, hackers, or employees/contractors - if we can be alerted the moment critical system files and sensitive data files have experienced unauthorized changes, then we’ve gone a long way in…


GoldenEye Ransomware: Shaken, Not Stirred - Notes from the Underground
What do action, adventure, cool gadgets, Vodka martinis—shaken not stirred—and ransomware all have in common? One word – GoldenEye. For my fellow Gen Xers, you probably remember this iconic James Bond film starring Pierce Brosnan as 007. I sure do. It was one of the best James Bond films ever made. The film involved an insidious plot by malicious actors…
Get the latest security news in your inbox.


Ransomware+: A New Shade of Evil
Ransomware has become an ever growing topic of conversation and concern in the security community during the last several years. According to the ZDNet article earlier this year — Ransomware is now the biggest cybersecurity threat — Danny Palmer asserts that ransomware has replaced the Advanced Persistent Threat (APT) as the most problematic cyber threat. He’s not wrong. Ransomware has become…


Open Threat Exchange (OTX) Introduces New Features
AlienVault is releasing another major new feature called Private Groups in Open Threat Exchange (OTX) today. This new feature allows users within OTX to create a private group of other OTX users and control access to the threat data shared within that group. Threat data contained within the private group stays in the private group and is not shared more…