Blog Archive
cyber security risk brief 2018

How hackers leverage your IP addresses? IP Reputation as a Cyber Risk Assessment Metric

IP Reputation can be used as a cyber risk assessment metric to better understand how hackers leverage and exploit your IP addresses listed in websites used by hackers. What is IP Reputation? Employees may download applications that compromise computers and network. As a result, IP address can become part of a hacker’s network and hosting […]
Malicious JavaScripts

Malicious JavaScripts: How Can You Get Hacked?

Malicious JavaScripts: How Can You Get Hacked? Detecting the vulnerabilities and leaking are of the essence in hacking. That’s why maintaining cyber security is quite crucial for individuals and corporations. In 2017, even a big firm like Yahoo was hacked by a simple phishing e-mail. Equifast -one of the largest credit bureaus- was hacked through […]
Cyber Insurance GDPR

General Data Protection Regulation (GDPR) and Cyber Insurance

The countdown has begun: the General Data Protection Regulation (GDPR) will be applicable  as of May 25th,2018, aiming to strengthen the rights of the citizens of EU on the internet. This regulation will be implemented by the European Union, but it is also interest of  companies located in other countries, including the United States, which […]
memcached ddos attack

Are your assets at risk of being victimized or weaponized in a Memcached DDoS attack?

Two record-breaking DDoS attacks, which used misconfigured Memcached servers for amplification/reflection, created 1.35 Tbps and 1.7 Tbps bogus traffic towards GitHub and an unnamed US-based company, respectively. Even though amplification/reflection DDoS attacks are not new to the cyber security world, the amount of traffic created is terrifyingly huge thanks to misconfigured Memcached servers’ amplification by […]
cybersecurity technology summit

Cybersecurity Technology Summit

Cybersecurity Technology Summit; Winners from five Shark Tank Events all come together for the final round of presentations and judging. The 8th Annual Cybersecurity Technology Summit reflects the DC chapter’s longstanding commitment to supporting the armed forces’ on-going development of cybersecurity strategies and tactics. As before, the summit will provide attendees with insights into emerging innovations from the government […]
bitcoin exchange safe

Are Bitcoin Exchange Sites Safe?

Are Bitcoin Exchange Sites Safe and What Are the Vulnerabilities? Bitcoin Mania is all over the world. Bitcoin interest has expanded from Wall Street habitues to housewives in South Korea. Bitcoin trading became so popular that several major websites had to pause the admittance of new accounts. Cyber security is naturally a significant part of this […]
deep web, dark web, bitcoin

Deep Web and Black Market

WHAT IS DEEP WEB? The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason. The opposite term to the deep web is the surface web.  What is inside the deep web? Let’s take a look at the figure […]
Domain Shadowing

Domain Shadowing

What is Domain Shadowing? The concept of domain shadowing has first appeared in 2011, and domain shadowing attack is defined as the creating new subdomains to intervene in traffic flow by attackers. Domain shadowing is the process of creating subdomains by domain owners using credentials. Subdomains are created for legitimate domains. For cyber criminals, domain […]
Free Intelligence Service

Free Intelligence Service

NORMSHIELD FREE INTELLIGENCE SERVICE AGAINST CYBER THREATS! NormShield Cyber Intelligence service continuously monitors potential cyber threats globally and has started to publish freely phishing fraudulent domain names abused actively by ransomware malware operators starting from June 1 2016. The first phase aims to handle threats specific to Turkey, however, the focus will be shifted to […]
normshield manage risk

NormShield is Hiring ASP.NET MVC Developers

NormShield needs junior or senior level web developers with ASP.NET MVC, Entity Framework skills. The position is for ongoing web interfaces of NormShield cloud and intranet version development. The prospective employees will have the chance to work in an ongoing project in a team of expert developers for corporate end-users. Please send your applications to […]