Categories
News

Ransomware goes Retro with PayDOS and Serpent written as Batch Files

The first variant discovered by Jakub is called PayDOS and is a batch file converted into a executable. When run, the executable will extract the batch file into the %Temp% folder and  run it from there. Once executed, batch file will scan certain folders for certain file extensions and rename the file so that one letter […]

Categories
News

Introducing Microsoft Teams—the chat-based workspace in Office 365 – Office Blogs

https://blogs.office.com/2016/11/02/introducing-microsoft-teams-the-chat-based-workspace-in-office-365/

Categories
How-To Software Technical

Check Point 600 Appliance Software Blade Stuck in Updating status

Recently I had a chance to get my hands on this excellent Firewall by Checkpoint. And as you know not everything goes perfectly, and this is where you get a chance to learn how it works, while you fix. I encountered an issue where one of the Threat Prevention Blades was stuck in updating mode […]

Categories
How-To Technical

Check Point 600 Appliance Initial Setup

The following is a quick video of the setup of a Checkpoint 600 Security Appliance Notes right from the admin guide: http://downloads.checkpoint.com/dc/download.htm?ID=24000 Check Point 600 Appliance Overview Check Point 600 Appliance delivers integrated unified threat management to protect your organization from today’s emerging threats. Based on proven Check Point security technologies such as Stateful Inspection, […]

Categories
How-To

Capture PuTTY Session Logs

In the past week I have had my good share of working on remote systems where I needed to utilize the tool PuTTY to issue commands; not all of them documented. To assist me in documenting my steps I often use the session logs. However this normal has been a manual process in the heat of […]

Categories
News

IT Security Seminar with FBI Cyber Division

Yesterday I attended a joined seminar with Virtuit Systems & FBI Cyber Division. Focal areas: Ransomeware and Zero-Day Attacks and How to fight against them Opening with a one (1) hour discussion: Guest Speaker: Philip Frim, Supervisory Special Agent with the FBI’s Newark Division. Topics Development of FBI’s Cyber Division Program Computer Analysis and Response […]