• Oxford: +44 (0)1865 877830 
  • Manchester: +44 (0)161 713 0176 
  • Edinburgh: +44 (0)131 541 0118 
  • New York: +1 646-781-7580 
  • Minneapolis: +1 612-324-7410 
  • Bucharest: +40 316 301 707 

Blog

You are here

03

Sep

Behavioural Analysis of Malware via Network Forensics

Most antivirus systems today use signature-based detection in order to identify given binaries as malware. Malware authors adapting to this with anti-forensic tooling has lead to the use of behavioural and heuristic analysis in order to detect and classify malware types.

16

Aug

Sophos UTM Firewall Hardening

Firewalls are used as the main defence for an organisation’s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls.  Achors #access_control #central_auth #tacacs #radius #ldap #named_accounts #complexity #lockouts #admin_ports #rules #comments #inactive_rules #explicit_deny #permissive #syslog #high_risk #restrict_outbound

16

Aug

The Onion Routing Network Research

The Tor network is borne out of a research project by the Naval Research Laboratory and Defence Advanced Research Projects Agency called Onion Routing.

09

Aug

Check Point Firewall Hardening

Dionach perform a number of firewall reviews and we often have to interact with different technologies and vendors. Alongside Cisco firewalls, Check Point firewalls are a popular solution used by organisations.

02

Aug

Malware Anti-Forensics

Some of the forensic countermeasures used by malware authors are described within this blog post. The importance of remaining undetected has led to the continuation of the practice of malware authors advertising their product as Fully UnDetectable (FUD).

Pages