Resources

Blog

Cryptocurrency Miner among October's 10 Most Wanted Malware

A cryptocurrency miner has earned its place on a list of the top 10 most wanted malware for the month of October 2017. The browser-mining service in question goes by the name "CoinHive." It's a piece of JavaScript that site owners can embed into their websites. Whenever a user visits their domain thereafter, CoinHive will activate and begin mining...
Blog

The Case of The Dark Web DDoS – Part 2

In part one of this two-part series, I described what we know about the September 14 attack against the drug sites on the Tor network. To review: The attack simultaneously took down 11 drug sites on the dark web, yet traffic patterns were unaffected. The site administrators indicated a problem on a public forum; and There was no discernible...
Blog

Women in Information Security: Victoria Walberg

Last time, I spoke with Nitha Suresh. She's written IEEE papers and knows her stuff when it comes to pentesting and aircraft data networks. This time, I had the pleasure of interviewing Victoria Walberg. She has a lot of ideas when it comes to IoT and the cloud. Kimberly Crawley: Please tell me about what you do, Victoria. Victoria Walberg: I'm a...
Blog

The Case of The Dark Web DDoS – Part 1

Think of all the recent DDoS attacks. They all seem to share the common trait of bad guys disrupting the normal flow of data against a legitimate business. Sometimes, these attacks are used for revenge, and other times, they are used for ransom. Sometimes, however, the bad guys become the targets. This is the story of an odd caper that played out on...
Blog

Cyber Security and the Human Factor – An Opinion Piece

Born and bred in IT – and first influenced by global Oil & Gas, the Japanese and the German manufacturing industry – I never experienced excessive levels of management before entering the more anglophile international workspace outside my home country. At best, between me and the board were only two clear structured formal management levels. Ranks and titles did not mean much; the assignment you...
Blog

Advanced Soft Skills for Information Security: Efficacy

Soft skills are a hot topic in information security. You’ll see a lot of articles, blogs and talks on the subject. I’d like to go a little deeper – beyond the basics of soft skills and talk about a concept from communication theory that can be used to achieve behavior change – efficacy. Efficacy is the ability to achieve a desired effect. In risk...
Blog

Microsoft issues advisory to users after macro-less malware attacks

Hackers have been found exploiting a freshly-uncovered vulnerability in Microsoft's software to install malware on business computers. According to security researchers, since last month a Russia-linked hacking group known as APT28 have been using a Microsoft protocol called Dynamic Data Exchange (DDE) to run malicious code through a poisoned Word...
Blog

Unthinkable! Hackers Loot Charity's Funds Right Before Christmas Season

Hackers have done the unthinkable by making off with a charity's funds right before the start of the 2017 Christmas season. The Utah Association for Intellectual Disabilities (UAID) first noticed something was wrong when it had not received any new email applications for help since 22 October. Typically, the charity gets numerous applications in...
Blog

Supercharging Cybercrime Detection with MITRE’s ATT&CK Framework

The majority of attacks that result in successful data breaches are simply not that complex. Many rely on well-known, tried-and-true methods. Indeed, the Verizon DBIR has for many years reported that upwards of 90 percent of attacks were successfully executed because of unpatched and known vulnerabiltiies or misconfigured systems. If we can only learn a few lessons from the latest attacks: ...
Blog

DEF CON 25: A First-time Speaker Experience

I’ve been involved in information technology and infosec since the mid-1990s. Until recently, I had not been actively attending infosec or hacker conferences. I started attending DEF CON in 2013 when the conference was held at the Rio Hotel. DEF CON was the first hacker conference I ever attended. I did not know many in the community and certainly...
Blog

Don't Let Real Estate Scams Crush Your Dreams of Home Ownership!

Fraudsters are increasingly targeting potential home buyers and real estate professionals with wire fraud schemes and phishing scams. In May 2017, the FBI revealed that the identified exposed losses resulting from business email compromise (BEC) scams increased by 2,370 percent between January 2015 and December 2016. Those scams preyed on...
Blog

Women in Information Security: Nitha Suresh

Last time, I talked with Glenda Snodgrass. She's a founder and the president of The Net Effect, a cybersecurity services company. This time, I had a fascinating discussion with Nitha Suresh. She taught me a bit about penetration testing and aircraft data networks. Kimberly Crawley: Hi, Nitha! Tell me a bit about what you do. Nitha Suresh: I am...
Blog

Fake WhatsApp Downloaded Over 1 Million Times Pulled from Google Play

Over one million Android users unknowingly downloaded a fake version of the popular WhatsApp messaging service from the Google Play Store. Disguised as an “update,” the app was designed to look nearly identical to the official version, and claimed to be developed by “WhatsApp Inc.” Over the weekend, however, several users on Reddit flagged the...
Blog

October 2017: The Month in Ransomware

Ransomware activity didn’t skyrocket last month, but there was definitely a substantial increase compared to September. Perhaps the most serious wake-up call was the onset of BadRabbit, a Petya-like culprit going on a rampage in Eastern Europe. A likely successor of the Cerber ransomware dubbed Magniber started making the rounds via the Magnitude...
Blog

Tor Browser Gets Interim Fix for Bug that Can Leak Users' IP Addresses

Certain users of the Tor Browser should implement a temporary fix for a vulnerability that can potentially leak their real IP addresses. On 3 November, Tor Browser 7.0.9 rolled out to macOS and Linux users. Included in the updated version is a fix for an issue that affects Tor Browser 7.0.8 on those two operating systems. Windows users aren't...
Blog

Policium Concisium: Advice on Writing a Security Policy

What do your policies look like? If your organization is like most, then your policies are probably voluminous and all-encompassing. This is a good thing – or is it? Probably one of the most painful aspects of being an infosec professional is having to author or review policies. (Audit is the other painful aspect.) When you first entered the field,...
Blog

EOL Systems: Combating the Security Risks with Foundational Controls

Security patches and updates leave companies at risk when they're running systems designated as end of life (EOL), such as .Net systems, Windows Server 2003, and Windows XP. When Microsoft releases an update or patch after the operating system (OS) is no longer supported, cybercriminals and malicious software develops dissect the update and reverse...