Indicator Of Compromise (IOC) – Part I

The current threat landscape is made of highly complex viruses and/or stealth intrusions, very difficult to prevent, identify, detect, etc. Also the IT environment is vast, heterogeneous, not always managed, making it even more difficult to ensure that a breach is contained quickly and in effective manner. So what do we need? An easy and standard way to describe a breach or the describe a malware and its behaviors. Also we need the ability to share this description You guess it, Indicators of Compromise are the solution!

[OS X] List processes using internet

Under OS X if you are interest to find out which process is using internet you can using the following command: lsof -i -P -n This command normally list all the open file on the system, but using the -i option it will list all…