Resources

Blog

BSidesDC Preview: Point-of-Sale to Point-of-Fail

I am looking forward to presenting at BSidesDC this weekend, where I'll be giving a talk titled "Point-of-Sale to Point-of-Fail." In my presentation, I will be discussing the recent rash of retail breaches over the past couple of years and how and why they are occurring, and what retailers can do to protect themselves. The epidemic of mega-retail...
Blog

Dridex P2P Malware Nets Cybercriminals $40 Million

US-CERT published an advisory today regarding the Dridex banking Trojan following a massive resurgence of the malware over the past few weeks as part of a large phishing campaign. Dridex is an evolution of an increasingly sophisticated family of malware focused on stealing banking credentials. This particular strain of bank credential-stealing...
Blog

VERT IoT Hack Lab: Developing Your Inner Hacker

Getting root is fun, and with IoT gadgets, getting root is generally easy. This is why the IoT Hack Lab @ SecTor will be so much fun! If you still reminisce about (or look forward to) the first time you got root on a device, and you will be in Toronto on October 20-21, visit us at the convention centre where we’ll be setup in the expo hall. Expo...
Blog

Protected Passwords: The Key to Web Security in a Mobile Age

This week marks Week 3 of National Cyber Security Awareness Month (NCSAM). A program sponsored by the Department of Homeland Security (DHS) in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center, NCSAM emphasizes our shared responsibility in strengthening the cyber security posture of our...
Blog

VERT Threat Alert – October 2015 Patch Tuesday Analysis

Today’s VERT Alert addresses 6 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expects to ship ASPL-638 on Wednesday, October 14th. Ease of Use (published exploits) to Risk Table Automated Exploit Easy ...
Blog

VERT Vuln School - SQL Injection 102

In continuing our VERT Vuln School series on SQL Injection vulnerabilities, we’re going to take a look at how attackers can leverage this vulnerability to steal and exfilitrate data. Once we views bob’s account balance page, we notice that there’s another input-field that might be of interest, the...
Blog

Please Do Not Google That For Me

I was reading an article in one of my favorite security magazines, and the author mentioned a phrase and included the parenthetical thought “(Google that)”. At first, this seemed comical but a short paragraph later, the author repeated the technique, advising the reader to “Google that” with respect to another thought. This phrase doesn't just pop...
Blog

Cyber Insurance Premiums are on the Rise, Report Finds

A new report reveals that cyber insurance premiums are on the rise in response to a growing number of high-profile hacks and breaches. According to Timetric's Insight Report: The Future of Cyber Risk Insurance, insurers are raising the deductibles on existing companies' information security policies, whereas others are limiting the amount of...
Blog

Core SIEM Use Cases to Consider for Your Environment

If you are reading this article, you are probably aware that Security Incident and Event Management solutions, or SIEMs, are powerful systems that allow IT professionals to gather and analyze activity in a company’s infrastructure through the collection and correlation of logs. Though SIEM solutions have a significant amount of built-in content in...
Blog

Secure Computation and The Right to Privacy

In December 1890, Samuel Warren and Louis Brandeis, concerned about privacy implications of the new “instantaneous camera,” penned The Right to Privacy, where they argue for protecting “all persons, whatsoever their position or station, from having matters which they may properly prefer to keep private, made public against their will.” 125 years...
Blog

5 Tips for National Cyber Security Awareness Month

As a regular reader of Tripwire, you are aware that October is National Cyber Security Awareness Month. If you are a business owner, you are aware that every month is Cyber Security Awareness Month. To stretch the point one step further, as an employee, did you know that you are a valuable member of your organization’s Cyber Security Awareness team?...
Blog

Remote DoS Vulnerability Patched in Huawei 4G USB Modem

Chinese networking telecommunications equipment and services company Huawei has patched a vulnerability in its MBB (Mobile Broadband) product E3272s that if exploited could lead to denial-of-service attacks and remote arbitrary code execution. According to a security bulletin released by the company, "An attacker could send a malicious packet to...
Blog

Understanding External Security Threats

Cyber security is now a board-level risk across the entire spread of industry. However, it is a broad subject with a large number of unknowns, and some might say there's no real way to ever discover or quantify those unknowns. Unfortunately, this can result in cyber security being poorly understood and boards vulnerable to being misled by ‘snake-oil...
Blog

3 Tips on How to Create a Cyber Security Culture at Work

This October marks another iteration of National Cyber Security Awareness Month (NCSAM), a program designed to engage both the public and private sectors on good security practices via activities that encourage awareness and resiliency in the event of a national cyber incident. Sponsored by the Department of Homeland Security (DHS) in cooperation...
Blog

Building a Model for Endpoint Security Maturity

In today's world, our notion of endpoints has evolved from something with a user and a keyboard to something with exploitable vulnerabilities. This conceptualization therefore covers network connections beyond laptops, personal computers and mobile devices. Indeed, vulnerabilities arising from Internet of Things (IoT) appliances; automobiles, such...
Blog

VERT Vuln School – SQL Injection 101

SQL injection is arguably the most severe problem web applications face. OWASP, an online community devoted to web application security, consistently classifies injection vulnerabilities as number one on their OWASP Top 10 Project. SQL injection vulnerabilities are a favorite amongst a number of “hactivist” groups whose aim is to cause disruption in...