#intrusiondetection

mastodon.raddemo.hostadmin@mastodon.raddemo.host
2025-06-10

Top 5 #Security Features of #Imunify360
Imunify360 is a Linux server security solution designed to safeguard your web-based business against cyber attacks. It includes features like Intrusion Prevention and Detection system, Real-time #Antivirus Protection, Network #Firewall and Patch Management. ...
Continued πŸ‘‰ blog.radwebhosting.com/top-5-s #businesscontinuance #intrusiondetection #intrusionprevention #wordpresssecurity #hipaacomplianthosting #webapplicationfirewall #malwareremoval #malwarescanner

Rad Web Hostingradwebhosting
2025-06-01

Top 5 Features of
Imunify360 is a Linux server security solution designed to safeguard your web-based business against cyber attacks. It includes features like Intrusion Prevention and Detection system, Real-time Protection, Network and Patch Management. ...
Continued πŸ‘‰ blog.radwebhosting.com/top-5-s

2025-05-19

🐽 Snort Command Cheat Sheet: Understand Network Threats Like a Pro

Snort is a powerful open-source tool used for Network Intrusion Detection and Prevention (NIDS/NIPS). It's widely adopted by blue teams and security professionals to monitor, alert, and defend against malicious network activity.

🧠 Key Usage Modes (No Code Needed):

β€’ Test Mode: Check configuration files before deployment
β€’ Packet Sniffing Mode: Monitor live traffic and display it in real time
β€’ Packet Logging Mode: Capture packets and store them for analysis
β€’ IDS Mode: Analyze traffic against rule sets and raise alerts
β€’ Silent Mode: Run in the background while logging events

πŸ›‘οΈ Snort is great for:
β€’ Detecting port scans and suspicious payloads
β€’ Monitoring traffic for policy violations
β€’ Integrating with SIEM solutions
β€’ Practicing blue team defensive strategies

Disclaimer: This content is intended strictly for educational and awareness purposes. Use intrusion detection systems responsibly and ethically.

#Snort #NetworkSecurity #CyberSecurity #InfoSec #BlueTeam #IDS #EducationOnly #IntrusionDetection #SOCTools #PacketAnalysis

Rad Web Hostingradwebhosting
2025-05-13

Top 5 Features of
Imunify360 is a Linux server security solution designed to safeguard your web-based business against cyber attacks. It includes features like Intrusion Prevention and Detection system, Real-time Protection, Network and Patch Management. ...
Continued πŸ‘‰ blog.radwebhosting.com/top-5-s

Rad Web Hostingradwebhosting
2025-05-02

Top 5 Features of
Imunify360 is a Linux server security solution designed to safeguard your web-based business against cyber attacks. It includes features like Intrusion Prevention and Detection system, Real-time Protection, Network and Patch Management. ...
Continued πŸ‘‰ blog.radwebhosting.com/top-5-s

Rad Web Hostingradwebhosting
2025-04-15

Top 5 Features of
Imunify360 is a Linux server security solution designed to safeguard your web-based business against cyber attacks. It includes features like Intrusion Prevention and Detection system, Real-time Protection, Network and Patch Management. ...
Continued πŸ‘‰ blog.radwebhosting.com/top-5-s

Rad Web Hostingradwebhosting
2025-03-29

Top 5 Features of
Imunify360 is a Linux server security solution designed to safeguard your web-based business against cyber attacks. It includes features like Intrusion Prevention and Detection system, Real-time Protection, Network and Patch Management. ...
Continued πŸ‘‰ blog.radwebhosting.com/top-5-s

Rad Web Hostingradwebhosting
2025-03-17

Top 5 Features of
Imunify360 is a Linux server security solution designed to safeguard your web-based business against cyber attacks. It includes features like Intrusion Prevention and Detection system, Real-time Protection, Network and Patch ...
Keep reading πŸ‘‰ blog.radwebhosting.com/top-5-s

Abdullah1xcoder
2025-02-17

🚨 IDS vs IPS: Understanding the Key Differences in Cybersecurity πŸ”

When it comes to network security, two crucial components that you’ll often hear about are IDS (Intrusion Detection System) and IPS (Intrusion Prevention System). Both are designed to protect systems from cyberattacks and malicious activity, but they operate in different ways.

Comelit South East AsiaComelitSEA
2025-01-03

πŸ”’ Overwhelmed by the increasing complexity of systems? Don’t worryβ€”let’s break it down in 5 key points!

Adopting integrated security systems allows for coordinated and intelligent management of , , and , simplifying operations for both end users and installers. Here’s what you need to know πŸ‘‡
Link

Andrew 🌻 Brandt πŸ‡threatresearch@infosec.exchange
2024-10-31

For those who don't know (which is most of you), this project has been the intense focus of my work, taking up a huge amount of my time, energy, and investigative effort for the past 14 months - while still helping others at Sophos publish their research; running an election campaign where I was a candidate for school board; speaking at Blue Hat, @defcon #Saintcon, #VirusBulletin and other conferences; guest lecturing to classes at CU Boulder; volunteering my time canvassing for political candidates; serving as a docent at the @mediaarchaeologylab; working as a poll worker during the current US election cycle; and starting up the Elect More Hackers (electmorehackers.com) organization.

Whew. It's actually kind of daunting just to read that. I also sometimes sleep and eat.

@SophosXOps has been, at its core, an institution that values radical transparency, and this story (and the earlier research investigations into the Operation Pacific Rim threat actors and incidents) demonstrates Sophos' commitment to truth and journalistic integrity, following a story wherever it leads.

I hope our publication today starts a larger conversation and collaboration within the cybersecurity industry - inside and outside the Cyber Threat Alliance, which Sophos actively supports and where I am proud to represent my employer - to work together to thwart the ambitions of nation-state threat actors such as the perpetrators of Operation Pacific Rim, in order to protect the privacy and safety of everyone, everywhere.

#PacificRim #OperationPacificRim #malware #china #hacking #hacks #infosec #firewalls #intrusiondetection

sophos.com/en-us/content/pacif

2024-08-29

Pawel Krawczyk: DevOps guide to the galaxy of self-defending applications (Devoxx Ukraine 2019)

video.echelon.pl/videos/watch/

2024-08-06

Did you miss our SysAdmin Day gift? There's still time to download your copy of 10 Terrific Tools for the Busy Admin. Special thanks to our partner #TuxCare mailchi.mp/admin-magazine.com/
#SysAdminDay #tools #security #gift #firmware #Linux #IntrusionDetection #OpenSource #utilities #admin

Happy SysAdmin Day! Get your free gift: 10 Terrific Tools for the Busy Admin, in partnership with TuxCare
Tinker β˜€οΈtinker@infosec.exchange
2024-08-01

There is something so satisfying in kicking off an entire RFC1918 scan.

Doing a single port at a brisk but safe (for my environment) pace.

~/# nmap -Pn -n -p <single port number> -T4 --open 10.0.0.0/8

~/# nmap -Pn -n -p <single port number> -T4 --open 172.16.0.0/12

~/# nmap -Pn -n -p <single port number> -T4 --open 192.168.0.0/16

(command broken out for dramatic effect - also note that I break out each of those CIDRs into /24's so that if anything breaks, I can pick up easier where the last known good ended. It's scripted and I prefer it this way.)

I am not doing a ping sweep or a DNS resolution. I'm assuming all hosts are up. And I'm looking for every host with a single port open. So even if they dont respond to pings (or something is preventing pings), I should get an answer back.

Note, I could certainly do faster (T5 or masscan, gawd) - but this is about as fast as I'm going to do in my environment and still be safe.

Also, only looking for open ports right now - no fingerprinting yet.

A cool thing about this approach is many intrusion detection still will only look for multiple ports on a single host to trigger an alert. Some still ignore many hosts / single port scans (to their detriment).

We've long sense purple teamed this, so I sent a notification to SOC letting them know my actions and asking them nicely (I bribed them last week) to not stop me, lol.

Should take a couple weeks to a month at this pace and in my environment to hit every single one of the just shy of 18,000,000 hosts πŸ˜‚

#pentesting #hacking #infosec #penetrationtesting #blueteam #redteam #intrusionDetection

LINUXexpert.orglinuxexpert
2024-07-22

Cyber threats are becoming more advanced every day, making it crucial to stay informed and prepared. Social engineering and deepfake attacks are two significant concerns that require robust security measures.
linuxexpert.org/cybersecurity-

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst