Performing Ethical Hacking Through a VPN Service for a Full Attack Simulation

A major difficulty in defending against attackers and performing accurate attribution, lies in the fact that threat actors often route their traffic through the proverbial seven proxies. Defenders often spend many hours determining the source of malicious traffic, only to find that the attacker has compromised the web server of an unrelated victim somewhere on … Continue reading “Performing Ethical Hacking Through a VPN Service for a Full Attack Simulation”

0

  • Nov 20, 2017
  • Glyn Moody
  • Governments, Privacy, Security,

Two ways to help preserve privacy in an age of massive leaks and deep hacks

We live in the golden age of leaks. That’s not to say that leaks didn’t happen before. But the move to digital data and the availability of high-speed Internet connections has made the exfiltration of data on a massive scale much easier. Where in 1971 Daniel Ellsberg had to photocopy 7,000 pages of what became … Continue reading “Two ways to help preserve privacy in an age of massive leaks and deep hacks”

0