Insights > Network Visibility + Security

      Fail Good and Fail Safely in a Cyber Range Environment

      Network Visibility + Security

      Fail Good and Fail Safely in a Cyber Range Environment

      Bob DuCharme 2023.03.07

      The case for cyber ranges - Part 3 I heard a comment the other day that really clicked something in my mind. The quote was "You don't know how vulnerable you are until you fail". This quote could have

      4 min read

      #Network Security #Cybersecurity #Software

      Remote Code Execution with ESXi - CVE-2021-21974 VMware ESXi Heap Overflow

      Network Visibility + Security

      Remote Code Execution with ESXi - CVE-2021-21974 VMware ESXi Heap Overflow

      Cristian Done 2023.02.27

      Recently, an old vulnerability targeting VMware ESXi has been spotted in the wild. The vulnerability we are talking about is CVE-2021-21974 and exploits the OpenSLP service running on port 427. A mali

      10 min read

      #Network Security #Cybersecurity

      A Quick Look into ChatGPT's Network Traffic

      Network Visibility + Security

      A Quick Look into ChatGPT's Network Traffic

      Anubhab Sahu 2023.02.22

      ChatGPT is making waves as the Internet's favorite chatbot. Apart from being hailed as the replacement for conventional Search Engines, its text generation capabilities are surprising everyone. To dem

      5 min read

      #Network Security #Network Visibility #Data Privacy

      The Fog of War in Incident Response Awareness

      Network Visibility + Security

      The Fog of War in Incident Response Awareness

      Bob DuCharme 2023.02.03

      The case for cyber ranges – Part 2 In my previous blog post I was telling you why you need continuous, hands-on security training to be prepared for a cyber incident. Let me tell you the story of a se

      7 min read

      #Network Security #Cybersecurity #Software

      KRPC Protocol: The Language of Torrent Peers

      Network Visibility + Security

      KRPC Protocol: The Language of Torrent Peers

      RAKESH SEAL 2023.01.31

      Abstract BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data over the internet. It works by allowing users to download small pieces of a file from multiple sour

      14 min read

      #Network Security #Network Analysis Apps #Network Test #Network Visibility

      A Golfer’s Guide to Not Buying Security

      Network Visibility + Security

      A Golfer’s Guide to Not Buying Security

      Bob DuCharme 2023.01.10

      The Case for Cyber Ranges – Part 1 I am a kind of unique nerd. I'm a nerd at heart but I also LOVE golf! I know, golf is not your typical nerd game. I have never played a video game before in my life,

      4 min read

      #Network Security #Cybersecurity #Software

      ATI Polymorphic Android Malware

      Network Visibility + Security

      ATI Polymorphic Android Malware

      Ayan Saha 2022.12.23

      In ATI, Polymorphic malware refers to samples of malware derived from a common malicious codebase that are changed in order to evade detection while remaining functionally malicious. The samples can h

      11 min read

      #Network Security #Cybersecurity