Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ RTTM - Real Time Threat Monitoring Tool

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š RTTM - Real Time Threat Monitoring Tool


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the company goes unnoticed until it becomes viral in public. Thus causing monetary/reputation damage. This is where RTTM comes into action. RTTM (Real Time Threat Monitoring Tool) is a tool developed to scrap all pasties,github,reddit..etc in real time to identify occurrence of search terms configured. Upon match an email will be triggered. Thus allowing company to react in case of leakage of code, any hacks tweeted..etc.. and harden themselves against an attack before it goes viral.
Over the past 2 years the tool has evolved from simple search. Artificial intelligence has been implemented to perform better search based on context. If regex is needed even that is supported. Thus behaviour is close to human and reduces false positives.
The best part of tool is that alert will be sent to email in less that 60 seconds from the time threat has made it to interent. Thus allowing response in real time to happen..
The same tool in malicious user hands can be used offensively to get update on any latest hacks, code leakage etc...

List of sites which will be monitored are:
  • Non-Pastie Sites
    • Twitter
    • Reddit
    • Github
  • Pastie Sites
    • Pastebin.com
    • Codepad.org
    • Dumpz.org
    • Snipplr.com
    • Paste.org.ru
    • Gist.github.com
    • Pastebin.ca
    • Kpaste.net
    • Slexy.org
    • Ideone.com
    • Pastebin.fr

Architecture:


How it works?
Once the tool is started , engine gets kicked off and it runs forever. The main input for this engine is the configuration file. Based on the configuration file data, engine goes ahead and probes twitter/github/reddit for matches configured in configuration file. Upon a match is found, the link of twitter/github/reddit pushed to sqlite DB and an email alert is triggered.
In case of pastie sites the logic is different. The reason being they do not support search nor streaming api's. Hence any new pastie made by any user, the link is fetched and pushed to kafka. From kafka any new link added is picked up and searched for matches configured in configuration file. Upon a match is found, the link of pastie site is pushed to sqlite DB and an email alert is triggered.
Over the past 2 years the tool has evolved from simple search. Artificial intelligence has been implemented to perform better search based on context. If regex is needed even that is supported. Thus behaviour is close to human and reduces false positives.

Detailed Tool Documentation:
https://real-time-threat-monitoring.readthedocs.io/en/latest/

Developers:
Authors:
  • Naveen Rudrappa
Contributors:
  • Sunny Sharma
  • Murali Segu


...



๐Ÿ“Œ Leaf Node Monitoring 2023.01 released! - Open source network monitoring tool written in C++/Qt (paid GPLv3 software)


๐Ÿ“ˆ 23.54 Punkte

๐Ÿ“Œ SolarWinds Threat Monitor โ€“ REVIEW 2019 (Advanced Threat Detection and Monitoring)


๐Ÿ“ˆ 22.56 Punkte

๐Ÿ“Œ TA505 Cyber Threat Actors Installing Remote Monitoring Tool via Weaponized MS Word Document


๐Ÿ“ˆ 21.19 Punkte

๐Ÿ“Œ TA505 Cyber Threat Actors Installing Remote Monitoring Tool via Weaponized MS Word Document


๐Ÿ“ˆ 21.19 Punkte

๐Ÿ“Œ Slashdot Asks: Is It Time To Dump Time Zones In Favor of Coordinated Universal Time?


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ Slashdot Asks: Is It Time To Dump Time Zones In Favor of Coordinated Universal Time?


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ Ask Slashdot: Is it Time To Call Time on Time Zones?


๐Ÿ“ˆ 18.53 Punkte

๐Ÿ“Œ He newly added monitoring elements are called active monitoring and heartbeat, and it appears they are sending user data to ccleaner servers.


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ NeDi 1.9C Monitoring History /Monitoring-History.php det sql injection


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ SigNoz - an open source application monitoring software | v0.2.0 Released with external API and DB calls monitoring


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ Monitoring Your Cloud And Hybrid IT Infrastructure: How To Find The Right IT Monitoring Solution For Your Cloud-first Approach


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ Percona Monitoring and Management 2.37: The Improved Inventory View, New Experimental Dashboards for Kubernetes Monitoring, and More!


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ Zabbix as Universal Monitoring System for IT Company: Tips for Effective DevOps Monitoring


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ RabbitMQ Monitoring | Key Metrics & In-Built RabbitMQ Monitoring Tools


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ PostgreSQL Monitoring with Percona Monitoring and Management: A Redefined Summary


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ Grid Monitoring: Nvidia ermรถglicht Monitoring virtueller GPUs


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ Grid Monitoring: Nvidia ermรถglicht Monitoring virtueller GPUs


๐Ÿ“ˆ 18.16 Punkte

๐Ÿ“Œ DNS traffic monitoring, a threat to Tor usersโ€™ anonymity


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ Threat Monitoring Alerts in the Night: Is Anybody Watching?


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ CISO Perspective: How Digital Risk Monitoring Fits Into Threat Intelligence Programs


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ DEF CON 27 Packet Hacking Village - Besim Altinok - Wi Fi Threat Modeling and Monitoring


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ Traffic-, Performance-Analyse und Threat-Detection mit Echtzeit-Monitoring - Netzpalaver


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ 5 Best IT Threat Monitoring Systems and Why You Need It


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ The threat monitoring service offered after the Starwood breach has a max password length of 15 characters


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ Endpunktschutz, Threat-Prevention, Detection and Response, 24x7-Monitoring, proaktives ...


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ DNS traffic monitoring, a threat to Tor usersโ€™ anonymity


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ Threat Monitoring Alerts in the Night: Is Anybody Watching?


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ CyberX Receives U.S. Technology Patent for ICS Threat Monitoring Analytics


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ Cygilant partners with LogPoint to bring SMBs threat monitoring and analysis capabilities


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ Threat Hunting: Log Monitoring Lab Setup with ELK


๐Ÿ“ˆ 15.82 Punkte

๐Ÿ“Œ Threat Hunting: Velociraptor for Endpoint Monitoring


๐Ÿ“ˆ 15.82 Punkte











matomo