Featured
Critical Incident Response: WordPress Compromise & Recovery
A detailed case study of identifying, containing, and recovering from an active website compromise in under 3 hours.
Nov 15, 20248 min readIncident Response
Read Case StudyCase studies, technical writeups, and security research findings
A detailed case study of identifying, containing, and recovering from an active website compromise in under 3 hours.
Suricata flagged a full TLS handshake on a non-standard high port from M247 (AS9009) — likely targeted recon, C2 discovery, or honeypot fingerprinting.
Sentrypeer captured SIP INVITE floods from GoDaddy (AS398101) with Cisco-SIPGateway spoofing and sequential premium-rate targets — classic revenue-share fraud.
Clean TCP handshake → banner grab → immediate RST on 9770/TCP from ONYPHE (AS213412): how commercial scanners catalog your services — and how to respond.