Security

Risks from timekeeping machine vulnerabilities

At present, timekeeping machines integrate magnetic lock can be taken advantage by hackers. According to recent research, these vulnerabilities were exploited for remote access to sensitive personal information such as name, department, fingerprint, pin code, and so on. The...

Technologies in manufacturing, designing Data Diode

Data Diode, a one-way data security device, that has been theorized for its security level "air gap", when using an optical diode to transmit signals between two systems without a physical connection, simultaneously there is an exclusive diode for the...

An old spyware in disguise of a new cyber-attack campaign

By the end of September 2018, a cyber-attack campaign by email was discovered by CyRadar. Hackers trick users into downloading and executing malicious files on their computers. At this point, the malicious code immediately performs a series of silent...

Application of a data diode in Industrial Control Systems

This article describes a variety of deployment options for physical data transfer, or data diode, that outperform traditional options for service quality, reliability, and security. Basically, the data diode is a one-way data transfer system used to isolate high-security...

Warning: A new malware campaign targeted at Vietnamese banks

On August 22, 2018, CyRadar's surveillance system discovered a new cyber-attack targeting one of Vietnam's major banks. Shortly after, CyRadar repeatedly discovered that several other organizations had also been attacked in similar ways. At the time of the attack,...

Detect Malicious Code exploiting SettingContent-ms File

In July 2018, CyRadar discovered a malicious software campaign aimed at the company. The attack started with emails containing malicious PDF files sent to a member of the company. Specifically, this employee receives two emails with the same content: Tap .SettingContent-ms Recently,...

Analysize APT attacks targeting banks in Vietnam

Now security for banks is emergent, besides the fact that customers continuously receive fraudulent messages in order to steal card information. VNCERT rings a warning bell to banks about the risk of APT attacks (Advanced Persistent Threat).

Security information and event management (Part 2): Techniques to determine the rule of SIEM...

In the first part of the article on Security information and event management – SIEM, the writer shared the components of SIEM system and the methods of collecting information. In part 2, the article gives an insight into the techniques...

Security Information and Event Management – SIEM (Part 1)

Nowadays, cyber attack, phishing, or malware issues, etc., are becoming more commonplace and a major problem for organizations. The information system of organizations needs a solution to collect, manage and analyze information security events. SIEM (Security information and event...

Overlapping techniques in the infrastructure of virtualized data center system

A few years ago, virtualization and cloud technologies have become ever more popular, and enterprises' perceptions of server resource consumption (including CPU, RAM, storage, etc.) has increased dramatically. It results in the demand for the virtualized data center. In...

New posts

Popular posts