Basic cyber hygiene still offers the best defense against ransomware
Attackers do the most damage exploiting weak passwords and companies that don’t deploy MFA – so start with the cyber basics and apply new technologies as needed.
Scanning Activity from Subnet 15.184.0.0/16, (Thu, Oct 17th)
I noticed in my logs 2 weeks ago regular probe from a subnet in the Amazone cloud only scanning for TCP/8080 capture by the iptables of my DShield sensor. The scanning started on the 15 Aug - 4 Oct 2024 where the sensor recorded 1046 individual IPs...