How to detect a cyber attack
-
I will say that whilst I've never seen an issue with it on numerous pfSense installs, including my own, Google respond to ping there more as a courtesy. They could just stop responding. Also when you ping 8.8.8.8 you are hitting a machine via anycast so the service may vary depending on where you are pinging from.
Steve
-
@stephenw10 said in How to detect a cyber attack:
I will say that whilst I've never seen an issue with it on numerous pfSense installs, including my own, Google respond to ping there more as a courtesy. They could just stop responding. Also when you ping 8.8.8.8 you are hitting a machine via anycast so the service may vary depending on where you are pinging from.
Steve
Let's hope they don't pull the rug out from under us. I think a lot of gateways would be marked as down :)
-
@Raffi_ said in How to detect a cyber attack:
Let's hope they don't pull the rug out from under us. I think a lot of gateways would be marked as down
I hope so too!
I tried monitoring White House and Pentagon IP´s but it did not succedd.
Those IP´s, I believe, would be the last to be down. :)
Thank you everybody.
-
@hugoeyng said in How to detect a cyber attack:
@Raffi_ said in How to detect a cyber attack:
Let's hope they don't pull the rug out from under us. I think a lot of gateways would be marked as down
I hope so too!
I tried monitoring White House and Pentagon IP´s but it did not succedd.
Those IP´s, I believe, would be the last to be down. :)
Thank you everybody.
haha I hope you don't get a knock on the door from people in black suits.
-
@hugoeyng said in How to detect a cyber attack:
I tried monitoring White House and Pentagon IP´s but it did not succedd.
So, White House Down?
https://www.imdb.com/title/tt2334879/
Jeff
-
@Raffi_ :))))))
-
@akuma1x hahaha The first to be under attack. Is not a good idea use it to monitoring. Is more secure using the butcher shop next door IP.
-
In most cases, a cyberattack is almost impossible to notice. This operation takes place instantly and the user does not even understand how the intruders entered the system and control it. This situation happened in the office where I work a few months ago. Cybercriminals tried to get hold of our customer base and spread this information online. They penetrated the network and got all the access codes and passwords from our system, which is why the programs crashed and, by chance, they were unable to commit theft. Since then, we've turned to Cyber Essentials to help protect and support our system from potential threats. I hope this will not happen again.