I've seen similar issues (years ago) where some ISPs didn't honour DNS
TTLs, and would instead cache the results a LOT longer.
On Mon, Oct 7, 2019 at 9:08 AM Mike wrote:
> Hello,
>
>
> I am moving a number of web sites from one colo to another,
> re-numbering them in the process, and I
I work for a MSSP (Managed Security Services Provider) that provides some
of these services including vulnerability scanning and such. If it's a
legitimate provider doing work for customers, you should never get a
complaint about their activities. Before we do any kind of scan, we have a
Canadian here who's evaluated service providers and dealt with legal
requirements for our customers...
Generally we weren't worried about data travelling through the US based on
normal internet routes, as long as it was encrypted. The thing we usually
specified in RFPs was that the data could
Just a note folks that while this particular ransomware is using the
MS17-010 exploit to help spread, it does not rely on it. This is still a
regular piece of ransomware that if someone opens the malicious file, will
encrypt files.
SANS has some IoCs and more information:
4 matches
Mail list logo