Restore Deleted Logs Using Python Script

12 Dec 2017
Posted in: 

When the Shadow Brokers released numerous hacking tools and exploits designed by the NSA-linked Equation Group, a lot of attention was given to the EternalBlue exploit. This was particularly the case in May this year when the EternalBlue exploit was leveraged with the WannaCry ransomware. The event made news headlines globally and managed to shut down large sections of the British National Health Service. With last year’s release of NSA tools there was one particularly nasty piece of malware, DanderSpritz.

Communication to CIO/CISO in the Health and Finance Industries

18 Aug 2017
Posted in: 

In the wake of the WannaCry and the more sinister Adylkuzz cyber-attacks, those employed as Chief Information Officers and Chief Information Security Officers within their organizations will be at the front line of defending their organizations against cyber threats. Due to the highly regulated nature of both the Finance and Health industries, compliance requiring security monitoring is of the utmost importance in preventing and mitigating cyber threats. However, the cost of creating in-house continuous cyber monitoring is inhibiting for most organizations. What is required is a partner. A partner who can provide 24/7 monitoring with extensive correlation rules combined with the right technology and experienced staff. All of which if done in-house can run into the hundreds of thousands of dollars.

Logs: The Forgotten Security Solution

6 Jan 2017
Posted in: 

The ever changing threat scape faced by organisations on a daily basis can keep staff, owners, and investors up at night. The ever present threat of a malicious cyber-attack can destroy an organisation no matter how big it is. How to combat and protect invaluable data in this cyber mine field? The answer lies in security log collection and analysis. What are logs? Logs, or security logs, are essentially record events either on a single device or a network as a whole. Logs record data such as logon events, object access, policy changes, privilege use, and system events just to name a few things recorded. Why are logs essential to cyber security?

Contact Us