IP Subnet Sheet

Have you ever wondered what is a /27?  Or how many IP addresses do I get to use with a /28?  Is there a use for a /31?  CIDR Subnet Mask Total IPs Usable IPs /32 255.255.255.255 1 1 /31 255.255.255.254 2 0* /30 255.255.255.252 4 2 /29 255.255.255.248 8 6 /28...

How to Avoid SamSam Ransomware

“SamSam ransomware is still plaguing organizations across the US, with fresh attacks against 67 new targets — including at least one involved with administering the upcoming midterm elections…” That was the lead line in a recent ZDnet article, evidencing...

What is Fileless Malware

Fileless, Malwareless, In-Memory Malware, Hidden Malware… regardless of what names these attacks are given by the press, they all share the same attack characteristics. These attacks do not write files to disk, but rather, they exist and operate solely within system...

Endpoint Attacks on the Rise

As a rule, we don’t sensationalize.   Cybersecurity is complex and confusing enough, so we focus on the facts since they can be scary enough. That being said, we also feel it’s important for business and consumers to thoroughly understand their risks and what...