Cybersecurity

Eagle-Eye-T-Banner-How-Does-mTLS-Work

How Does mTLS Work?

What makes mTLS different to standard TLS is that it is two ways. It is also helpful to understand how TLS on its own works using the public key cryptography…

Read more
Eagle-Eye-T-Banner-What-is-mtls

What is mTLS?

A variation of the transport layer security (TLS), there is mutual TLS (mTLS). TLS is the successor to secure sockets layer (SSL) and is the most widely deployed standard for…

Read more

Why Is mTLS Needed?

mTLS is an important component of a zero trust architecture. One of the principles of zero trust networking is to assume that there is an attacker that has infiltrated your…

Read more
Eagle-Eye-T-Banner-How-Is-mTLS-Implemented

How Is mTLS Implemented?

Proving Identity Is The Hardest Part of mTLS mTLS has significant security advantages, but it also has some implementation challenges such as the establishment of secure mechanisms for services to…

Read more
Eagle-Eye-T-Banner-Rocket-Alert-App

Rocket Alert App Spoofed, Targets Israeli Android Users With Malware

With a war raging between Hamas and Israel, there seems to be a war also being raged in cyberspace that is continuing to emerge. As soon as the first gruesome…

Read more
ALERT! – Critical Zero Day Vulnerability Reported by Google in Libwebp

ALERT! – Critical Zero Day Vulnerability Reported by Google in Libwebp

A critical zero day vulnerability that was already exploited in the wild and patched in Chrome by Google has a new CVE ID (CVE-2023-5129). This issue is not a zero…

Read more
Eagle-Eye-T-Banner-Amazon-AWS-S3

Amazon AWS S3 Buckets Used To Deliver Malware Through S3 Buckets

Malicious threat actors are exploiting expired Amazon AWS S3 buckets to place malicious code into legitimate packages in the npm repository with out having to make modifications to any of…

Read more
Part 3 De Anonymizing Domains on the Dark Web – Favicon matching

Part 3 De-Anonymizing Domains on the Dark Web – Favicon matching

Favicon Matching The second method that is used to uncover a dark web based website on the surface internet (clear internet) is the process of "favicon matching". A favicon is…

Read more
Part 2 De Anonymizing Domains on the Dark Web – TLS Certificate Matching

Part 2 De-Anonymizing Domains on the Dark Web – TLS Certificate Matching

The first approach used by Cisco's Talos Threat Intelligence team was that of TLS certificate matching. With this approach the self signed certificate that is used by their dark web…

Read more
The Ability to De-Anonymize Domains on the Dark Web

The Ability to De-Anonymize Domains on the Dark Web

Members of the Cisco Talos Threat Intelligence team have developed 3 techniques to identify ransomware operators websites hosted on the dark web and their respective IP Addresses. This has given…

Read more