Cyber Operator Articles

Trusted Kernel Rootkit Detection for Cybersecurity of VMs Based on Machine Learning and Memory Forensic Analysis*

In summary, the journal presents a convincing method, a TKRD (Trusted Kernel Rootkit Detection), to detect known and unknown rootkits in VMs from private cloud environments. The method combines the memory forensic analysis and machine learning to detect viruses with proven experimental results. However, some assumptions are required for further study.

Read more →

Distributed Denial of Service Attacks – TCP Syn Flooding Attack Mitigation.

The most dangerous attacks on internet services and networks are Distributed Denial of Service Attacks (DDoS), as discussed in the article " Distributed Denial of Service Attacks - TCP Syn Flooding Attack Mitigation ". The TCP syn flood DDoS attacks on the Apache server are mitigated using a method that is given. With a chosen time period, the effect of syn flooding will be lessened.

Read more →

SEC Proposed Cybersecurity Disclosure Rules

SEC Proposed Cybersecurity Disclosure Rules: In March 2022, the Securities and Exchange Commission (“SEC”) announced [proposed amendments to its rules](https://www.sec.gov/rules/proposed/2022/33-11038.pdf) (“Proposed Rules”) concerning cybersecurity disclosures for publicly traded companies (“issuers”).

Read more →

New York State Department of Financial Services (NYDFS) Proposed Cybersecurity Rules

On November 9, 2022, the New York Department of Financial Services (NYDFS) released proposed amendments to its cybersecurity regulations that govern Class A financial entities licensed to operate in the state of New York defined as having over 2,000 employees or over $1 billion in gross annual revenue, and at least $20M in gross annual revenue in each of the last two fiscal years from business operations in New York.

Read more →

Ransomware Education

Some individuals believe that cybersecurity is solely the government’s responsibility, or the responsibility of technology companies. However, every organization and individual has a responsibility to defend against cyberattacks.

Read more →