Virtual-HSM: Virtualization of Hardware Security Modules in Linux ContainersOSLL
Β
In the report the technology of virtual security modules will be presented. It rely on Linux containers. The report should be interesting for those people who are planning (or already using) could services for building IT-infrastructure.
I.Kukalo - "Creating UTM System" on Microsoft congference in TPUguestc6d031
Β
Unified threat management (UTM) is used to describe network firewalls that have many features in one box, including e-mail spam filtering, anti-virus capability, an intrusion detection (or prevention) system (IDS or IPS), and World Wide Web content filtering, along with the traditional activities of a firewall. Main goal of this research is to create own open-source based UTM system, that has almost all capabilities as their commercial analogs.
I.Kukalo - "Creating UTM System" on Microsoft congference in TPUIvan Kukalo
Β
Unified threat management (UTM) is used to describe network firewalls that have many features in one box, including e-mail spam filtering, anti-virus capability, an intrusion detection (or prevention) system (IDS or IPS), and World Wide Web content filtering, along with the traditional activities of a firewall. Main goal of this research is to create own open-source based UTM system, that has almost all capabilities as their commercial analogs.
This document discusses using a cloud-based sandbox called SitC for malware analysis. It provides two use case examples of analyzing the CosmicDuke and Epic Turla advanced persistent threats. It then compares the report features of various sandbox solutions and provides sample SitC reports. It outlines the incident response workflow and technical requirements for deploying SitC. The document concludes that SitC could be useful for malware detection and analysis tasks and offers one of the most comprehensive reports currently available.
War between Russia and Ukraine in cyber spaceuisgslide
Β
Cyber attacks increased in Ukraine during the revolution and Russian intervention. DDoS attacks targeted opposition media and banks, while personal accounts of opposition politicians were hacked. Mobile technologies were important for communication during protests. Russia occupied Crimea and turned off Ukrainian TV channels while hacking government systems and intercepting traffic. Ongoing cyber attacks support Russia's military operations and use of propaganda. Ukraine is working to improve its response through legislation, collaboration, and supporting cyber defense capabilities, but more efforts are still needed to prepare networks and critical infrastructure.
National CERT (CIRCL) is Luxembourg's computer emergency response team. It is composed of 8 full-time incident handlers and operates autonomously with its own infrastructure. In 2014, CIRCL handled over 83,000 security events and conducted over 3,000 technical investigations. CIRCL aims to improve cybersecurity in Luxembourg by providing firebrigade-like support to companies experiencing security incidents and acting as the default contact point for international cybersecurity cooperation.
Cyscon is a cyber security consulting firm founded in 2001 that works with internet service providers, banks, law enforcement, and NGOs. It gathers data from over 20,000 sensors on malware, spam emails, and malicious URLs to analyze cyber threats. This data is anonymized and shared with partners to detect threats and prevent attacks. Cyscon also provides detection and mitigation services directly to banks to help reduce financial losses from identity theft and phishing. It advocates for improving end-user security through free security tools and education programs to cut off threats at their source.