During these difficult times, users of many organisations find themselves working remotely, away from their usual office locations. For a lot of organisations, this is business as usual, and infrastructure is in place to support secure working practices from remote locations. However, for some, this is uncharted territory, and some ways in which internal data... Continue Reading →
Introduction Distributed Denial of Service (DDoS) attacks are designed to prevent or degrade online services. This blog post will explain, in extremely basic terms, a specific type of attack called a Reflection/Amplification DDoS Attack. This post is not intended to serve as a comprehensive technical guide, but merely a relatively non-technical overview for the novice.... Continue Reading →
Do we ever grow up? Image presented by Zoom bomber. We recently hosted an invite-only meeting with some of our business partners and clients. We followed most of the basic security measures and best practices for Zoom calls. Yet we got Zoom Bombed! How? The technical details are not the core story here, though we... Continue Reading →
One definition of 'proxy' is "a figure that can be used to represent the value of something in a calculation." Proxy servers are used for various purposes, some for hiding their true origination IP address for malicious intent; while others for circumventing totalitarian government censorship. Regardless of the use of proxies, with Augury we make... Continue Reading →
Guest Author: Lari Huttunen, Senior Analyst, Arctic Security At the end of March, we at Arctic Security noticed an uptick in the number of organizations being potentially compromised on a weekly basis...
COVID 19 is an ideal opportunity for malicious actors. With much of the global workforce working from home, we and our partners have seen a dramatic change in the compromise landscape (look for more analysis on that topic in an upcoming blog). The community is also very much aware of attempts to leverage popular websites,... Continue Reading →
Other threat intelligence groups have previously publicised that the Chinese-attributed threat group, Emissary Panda (aka APT27, TG-3390, BRONZE UNION, Iron Tiger and LuckyMouse), have been targeting various sectors in the Middle East, including government organisations. On 15 December 2019, Iran's Minister of Communications and Information Technology, Mohammad Javad Azari-Jahromi, announced that Iranian authorities had detected foreign spying malware on their government servers which they attributed... Continue Reading →
Many companies around the world are taking the sensible step of asking employees to work from home. What that means in theory is that the spread of COVID-19 will be partly slowed by the lack of additional exposures caused at the workplace. What this means in practice? Presumably the theory holds true but in addition... Continue Reading →