Are you listening to your logs? Part 3: High disk usage

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server... Read more »

Fake website serves fake vpn to steal cryptocurrency

The Sonicwall Capture Labs Threat Research team has analyzed a malware purporting to be an installer of a popular VPN software. This is not the first time that malware has pretended to... Read more »

Conquer it with correlation: Cryptojacking

Your company’s data is not the only valuable thing it has to offer to hackers looking for a payday. Organizational networks around the world have something much more basic which hackers can... Read more »