Resources

Blog

Two-Thirds of Orgs Don't Have a Strategy to Protect Their Endpoints, Study Reveals

In the information age, an organization is nothing without its critical endpoints. Those network systems function as the cornerstones of a corporate IT network and, as such, are crucial to maintaining smooth business flow. Without them, a company could suffer fiscal and/or operational consequences. Critical endpoints come in many shapes and sizes....
Blog

Change Management: The Foundation to Your Organization's IT Security

What is the first question you ask when something goes wrong in your environment? A system goes down? Service isn’t performing as it should? You flip the switch but nothing happens? In November of 1988, something happened that forever changed IT security and exponentially increased the need to ask this question. That is when the Morris worm was...
Blog

Flawed MatrixSSL Code Highlights Need for Better IoT Update Practices

SSL is a primary layer of defense on the Internet that makes it possible to have authenticated private conversations even over an untrusted network. Implementing a robust and secure SSL stack, however, is not trivial. Mistakes can lead to large attack surfaces, such as what we witnessed with OpenSSL when “Heartbleed” was discovered. In the wake of ...
Blog

Researchers Discover 500,000+ IoT Devices Vulnerable to Mirai Botnet

The Mirai botnet has made plenty of headlines recently after launching record-breaking distributed denial-of-service (DDoS) attacks against the website of well-known security journalist Brian Krebs. Earlier this month, hackers publicly released the source code of the Internet of Things (IoT) botnet powered by easily hacked routers, IP cameras and...
Blog

Eko Facebook Messenger Malware Targeting French Users via PM Scams

A Facebook Messenger trojan known as "Eko" is targeting French users of the social networking site via private message (PM) scams. The malware takes the form of a common Facebook scam type: a fake video of the recipient captured by one of their social media friends. It even uses the recipient's profile picture and name to add a sense of plausibility...
Blog

Managing Security Risk Introduced by Third-Party Libraries

One of my tasks here at Tripwire is to capture, understand and track security issues in our software products. Generally, I think of this as a kind of "technical debt" called "security debt." Like any kind of debt, the first step to managing and reducing it is identifying it. In my mind, this is something that is essential for a company producing...
Blog

Expert Advice on How to Create a Security Culture at the Workplace

We at The State of Security kicked off National Cyber Security Awareness Month (NCSAM) 2016 with a review of how companies can defend against common IT security threats. In one guide, we discussed how organizations can leverage their people, processes and technologies to protect against the likes of phishing and other risks. We then crafted...
Blog

Towards a Cyber Resilience Strategy

As most of you already know, October is National Cyber Security Awareness Month (NCSAM). The aim of NCSAM is to raise awareness across the international community about cyber threats, discuss best practices, and educate the public and private sector on how to stay safe online. Cyber Security is promoted extensively during this month, and many events...
Blog

ATM Malware Attacker Charged with Conspiracy to Defraud

London authorities have charged a member of a European ATM malware gang with conspiracy to defraud. The City of London Magistrates Court officially charged Emanual Leahu, 30, of Bacau, Romania on 30 September, though the City of London Police didn't announce the charges until 4 October. Officers with the London Regional Fraud Team (LRFT), which is...
Blog

Implementing a Password Security Policy at the Workplace for NCSAM

Every October, the Department of Homeland Security (DHS) acknowledges National Cyber Security Awareness Month (NCSAM) to help individual users and companies stay safe online. All NCSAM themes are connected by a single point of understanding: cyber security is a personal matter. As such, it often takes a person-centric approach to mitigate IT...
Blog

The Unforeseen Impact of Unforeseen Risk

It has been a long time since Yahoo has been number one in any market, but in September 2016, it "achieved" a new distinction: the single largest public data breach in human history. The numbers are astonishing, with tectonic shift-like potential implications for companies and organizations of all kinds: 500 million+ accounts affected $4.8...
Blog

Attackers Modifying Core WordPress Files to Redirect Visitors to Spam

Attackers are hacking WordPress sites and modifying core files in order to redirect legitimate visitors to malicious domains hosting spam. Sucuri Security analyzed the attack while helping a customer with their website. Bad actors had infected the site and modified it to redirect visitors to malicious domains, including “windows7keyonsale[dot]com...
Blog

Lessons from the Frontlines of Power Utility Attacks

Security experts have been warning companies and policymakers that systems protecting power utilities and other critical infrastructure are vulnerable to cyber attacks. Those intrusions could produce widespread damage, if they proved to be successful. In fact, as reported by Dark Reading, the Industrial Control Systems Cyber Emergency Response Team ...
Blog

TorrentLocker - Crypto-Ransom Is Still Active in Shadows

TorrentLocker, a ransomware family member, is a type of file-encrypting ransomware that significantly infected Windows operating systems. It was first observed in February 2014 and released in late August 2014. Later, it released with five new major releases. TorrentLocker encrypts the victim's data files by using a symmetric block cipher AES and...
Blog

End-to-End Encryption in Facebook Messenger

Facebook has added end-to-end encryption in Facebook Messenger but there are a few caveats that people need to be aware of. The first is that current messages are not encrypted. You will need to start a new message in order to enable this new option. It’s also important to note that encrypted messages are not available via Facebook but only found...
Blog

Sending The Elevator Back Down

"If you have done well in whatever business you are in, it's your duty to send the elevator back down and try to help bring up the next generation of undiscovered talent." As someone who has been in the security industry for over a decade, this quote from Kevin Spacey resonates with me. I have found the information security field to be particularly...
Blog

How I Became a CISSP – A Journey to Certification

On September 26, 2016, I received my final notice of my Certified Information Systems Security Professional (CISSP®) designation. My path to certification really began in 1996 when I first stepped into the computer world, but my decision to pursue certification began with a conversation that took place at NolaCon in 2015. I was chatting with a...