(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

Firewall

Ransomware: Hacienda of Puerto Rico

By |2023-04-15T14:36:51-04:00June 21st, 2021|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Firewall, Forensic, Hacking, Incident Response, Reports|Tags: , , |

Ransomware: Hacienda of Puerto Rico

Comments Off on Ransomware: Hacienda of Puerto Rico

Subscribing to the DShield Top 20 on a Palo Alto Networks Firewall

By |2022-06-15T01:21:25-04:00February 23rd, 2015|Categories: Firewall|Tags: , , , |

This link by Richard Porter provides a quick link to ip’s you can easily blacklist with any iptables or netfilter firewall. Ultimately, it provides a quick list of Tor nodes, known spammers and compromised hosts that any NOC/SOC would be interested in blocking. https://isc.sans.edu/diary/Subscribing+to+the+DShield+Top+20+on+a+Palo+Alto+Networks+Firewall/19365

Comments Off on Subscribing to the DShield Top 20 on a Palo Alto Networks Firewall
Go to Top