Flowmon blog

SUBSCRIBE TO RSS
: 10
Flowmon ADS integration with Elasticsearch

Flowmon ADS integration with Elasticsearch

ElasticSearch gathers more and more enthusiasm on the IT market. Released versions of ElasticSearch put the project into the group of most important solutions in Open Source community. New and new ...

Detect Web Cryptocurrency Mining With Flowmon

Detect Web Cryptocurrency Mining With Flowmon

Do the browsers that your business use support JavaScript? Well, it is truly hard to imagine that somebody exists on the Internet without this feature. Then computers in your network may be potenti...

Don’t Go Down The BadRabbit Hole

Don’t Go Down The BadRabbit Hole

Yet another ransomware campaign called BadRabbit has recently started to spread. Not to worry though, Flowmon helps to detect the BadRabbit as well as other rising threats and allows you to react i...

Worrying About Your WiFi Security Due to KRACK Vulnerability?

Worrying About Your WiFi Security Due to KRACK Vulnerabil...

Widely used WPA2 standard for WiFi Networks has been broken and it will take months to patch all affected appliances. It is a right time to consider how powerful your security is in order to deal w...

HUNTING FREQUENT AND DANGEROUS #2: Protection against Malware, Ransomware and Zero-day exploit

HUNTING FREQUENT AND DANGEROUS #2: Protection against Mal...

In our previous articles we discovered the most common types of cyberattacks. We also learned how they are designed and how they operate. Such understanding helps us build adequate and effective pr...

Detect ExPetr/Petya wiper

Detect ExPetr/Petya wiper

A new malware attack is spreading on the internet and causes big troubles to users and administrators. Find out how Flowmon helps with this recent threat.

DNS Monitoring in Flowmon – part 2/2

DNS Monitoring in Flowmon – part 2/2

Today we will have a look on how our advanced behavioral intelligence of Flowmon ADS can detect DNS service related security incidents and how it helped our customer find malware infected hosts in ...

System for sharing and analysis of security events in Czech cyberspace

System for sharing and analysis of security events in Cze...

Our network monitoring abilities grow every year, but our viewing glass is largely limited to the network we manage. But what if we have information about what has just happened in other networks?

12