Other Archive
machine learning

Machine Learning in Cyber Security Domain – 6: False Alarm Rate Reduction

Machine Learning False Alarm Rate Reduction; In some cases, IDS / IPS Systems may classify an event correctly or falsely. Classified events are evaluated in four categories in literature. True Positives (TP): intrusive and anomalous, False Negatives (FN): Not intrusive and not anomalous, False Positives (FP): not intrusive but anomalous, True Negatives (TN): Intrusive but […]
Botnet Detection, Malicious Javascript Code

Botnet Detection

Botnet Detection; Criminals often use trojans to infect a large number of computers for creating their zombie or bot networks. These bot or zombie computers form a network named botnet. As a keylogger, botnets are being used to steal a wide range of information, including tens of thousands of login credentials, generally for financial accounts, […]
NormShield Threat Vulnerability Orchestration

Unified Vulnerability Management

Unified Vulnerability Management; Security professionals usually apply penetration testing once a year but there are ~13000 new vulnerabilities discovered every year. Besides developers deploy new applications almost every month, 20K+ personally identifiable information (PII) leaks every week, hundreds of hackers scan every single possible port on entire Internet every day! Even a small mistake or […]
Social media Reputation

Social Network Monitoring

Social networking sites can be considered as an innovation in social connectivity. In general, social networking sites are used for good reasons: people keep in touch with loved ones and friends, sharing important moments of their life and marketing for their business etc. However, hackers, criminals, and other dishonest actors are abusing this capability for […]
Normshield Agent

Normshield Integrate with that SIEM

NormShield on-premises is a Unified Vulnerability Management (UVM) tool that helps companies to manage their technical vulnerabilities which is a very complex task in our scarce ITSec professional existing world. Since the SOCs are popular and important to corporate security, one of the slick features that NormShield UVM has is the ability to deferentially communicate […]
Social media Reputation

Monitoring Your Social Reputation

Social media has become the key medium for connecting existing and/or prospective customers. It is imperative for any enterprise to use social media actively and effectively. Hackers, too, are extremely interested in social media and they use social media for fun and profit. They both publish their findings about successful hacks and plus hack into […]
Fraudulent Domains

Catch Fraudulent Domains with NormShield

Fraudulent Domains; Sophisticated, spear or not, phishing attacks include registered domain names similar to yours and leverage these fraudulent domain names in order to better persuade victims who are trusting your company’s brand. It is easy to find unregistered domain names similar to yours with name generator services like NameMesh. Misspellings and typos in domain […]