Resources

Blog

Microsoft Patches Dangerous Group Policy Vulnerability

In February’s Patch Tuesday, Microsoft issued an update to fix a privately reported critical vulnerability in Group Policy that could allow potential attackers to achieve remote code execution (RCE) in domain networks. If successfully exploited, an attacker could gain complete control of a vulnerable system, install programs, view data and even...
Blog

11 Essential Bug Bounty Programs of 2015

With cybercrime and major hacking incidents reaching epidemic proportions, the importance of locating application-layer vulnerabilities is rising. Developers and companies are constantly striving to scan their code and improve code integrity in the early development stages, but no application is completely vulnerability-free and external scrutiny...
Blog

Threat Intelligence: Reduce the Gap

Major cyber security incidents continue to hit the headlines. Security and privacy are top concerns for IT and security professionals, especially after 2014’s highly publicized data breaches. Companies around the globe were victim to malware, stolen data and exploited vulnerabilities. Big companies weren’t immune to this, with Target, JPMogan Chase,...
Blog

Drones: Security Concern or Useful Resource?

Drones have been talked about quite a bit in the news over the past couple of years—whether it’s the use of unmanned aerial vehicles (UAV) by the military or the viral video showing Amazon’s proposal for speedy drone delivery, the devices have really grabbed people’s attention. Now, many are buying their own personal drones and most are looking at...
Blog

The Voice of the CISO: Interview with Robb Reck

Last week, we interviewed Brian Engle, the Chief Information Security Officer and Cybersecurity Coordinator for the State of Texas, and discussed with him the importance of communication in shaping cybersecurity as an ongoing management concern that businesses everywhere need to appreciate. As part of our ongoing “The Voice of the CISO” series, we...
Blog

10 Notorious Cyber Criminals Brought to Justice – No. 4

Last week, we investigated the story of Vladislav Anatolievich Horohorin, a Ukrainian hacker who was well known online for managing several web forums where cyber criminals could dump and sell users’ stolen payment card credentials. Tripwire now continues its series on some of the most notorious cyber criminals brought to justice with Vladmir...
Blog

Chipotle Website & Twitter Account Hacked

Chipotle's website and official Twitter account were compromised late Saturday evening and into Sunday morning. The website was redirected on Saturday around 6PM (PST) to Chipotle's official twitter account @chipotletweets and was then unresponsive. The Chipotle domain's technical and administrative contacts for the domain have been updated with a...
Blog

How Anthem Could Be Breached

According to the Associated Press, the attackers who targeted and exfiltrated more than 80 million customer records from Anthem Inc, were able to commandeer the credentials of at least five different employees. We know from Anthem themselves that at least one admin account was compromised, as the admin himself noticed his credentials being used to...
Blog

The Year of The Hack

It seems only fitting that 2014 should have ended with the much publicized hacking of Sony as the American public was inundated all year with one sensational account after another of damaging data security breaches. Those surrounding Target, UPS, K-Mart, Staples, Dairy Queen and Home Depot have certainly received the full attention of the media, as...
Blog

Microsoft Packing More CVEs into Fewer Security Bulletins

Patch Tuesday, the unofficial day on which Microsoft regularly releases security updates for its software products, has long been a staple of the information security community. On the second (and sometimes fourth) Tuesday of every month, Microsoft releases a unique set of security bulletins that provide patches for a range of new Common...
Blog

Cyberattack Projected to Have Little Impact on Sony’s Earnings

Sony’s projected third quarter earnings suggest that a cyberattack back in November of 2014 will have a lower financial impact on the conglomerate than originally expected. As of this writing, Sony was posed to announce a net profit of ¥31.91 billion ($269.54 million) for Quarter 3 in 2014, compared to a net profit of ¥27 billion a year earlier....
Blog

Hackers Hit Health Insurer Anthem, Millions of Customer Records at Risk

Anthem, the second largest health insurer in the United States, has admitted that hackers broke into its servers and accessed databases containing sensitive customer information. According to a statement issued by Anthem, who were formerly known as Wellpoint, both current and former customers are at risk after the hackers managed to gain access to...
Blog

The 60/40 Security Rule

On any journey we take as we progress through life, occasions will arise when we arrive at a juncture where we recognise that somewhere way-back, we may have taken a wrong turn, which has brought us to a less than ideal place – an imposition which I believe we find ourselves in today with mitigating cyber crime and its associated threats. So, first...
Blog

Harvesting Your Data From The Internet of Things

Last week, I presented a talk at OWASP's AppSec California titled "We All Know What You Did Last Summer," where I spoke on the topic of privacy, security and the "Internet of Things." My primary focus was not necessarily on the privacy and security of devices themselves, but more regarding the security implications of the data they generate. I used...
Blog

Comparing Cross-site Scripting Vulnerabilities

Cross-Site Scripting (XSS) vulnerabilities can, unfortunately, be found in all types of web-based applications. Indeed, they appear to be rather ubiquitous across the web. XSS falls into the category of code injection vulnerabilities and is a result of web-based applications consuming user-supplied input without proper filtering and sanitization....