Underground Economy Recap

452 delegates, 69 countries, 33 case studies, 17 workshops, 13 lightning talks, 2 evening receptions, 1 panel discussion, and countless memories and networking opportunities! Another successful Underground Economy conference!

May 6 – 7: RISE Colombia

Team Cymru is pleased to announce RISE Colombia! Come see us there! We will be in Colombia from May 6 - 7. We are happy to be working with our partners from LACNIC to host this event alongside LACNIC33! For more information and to register for this event, please register here. Don't know the password?... Continue Reading →

January 13 – 15: RISE Finland

Team Cymru is pleased to announce RISE Finland! Come see us there! This event runs from January 13 - 15, 2020. We are happy to be coming back to the beauty of Finland and the Baltic Sea a second time! For more information and to register for this event, please register here. Don't know the... Continue Reading →

December 2 – 4: RISE USA

Team Cymru is pleased to announce RISE USA! Come see us there! This event is slated to take place December 2 - 4, 2019, in beautiful Lake Mary, Florida, where Team Cymru has our global Headquarters. We are happy to invite you to our backyard! For more information and to register for this event, please... Continue Reading →

Webmin Vulnerability and Port Scanning Activity

The Webmin website states, "Webmin is a web-based interface for system administration for Unix." Many Hosting providers offer Webmin administration with their Virtual Private Servers. Recently, a presentation revealed backdoor code injected into the source for Webmin.  According to a Hacker News story published August 20: "The story started when Turkish researcher Özkan Mustafa Akkuş... Continue Reading →

Top 10 TCP Ports for Border Policy Review

Information Security guidance sometimes strikes practitioners as impractical. Many of us have more on our 'to do' list than we ever will complete. With that in mind, we put together our list of the Top 10 TCP Ports for Border Policy Review. Here, we use global counts of open ports and known security impacts to... Continue Reading →

Up ↑