Blog

Blog

ComRAT Spyware Still Evolving, Confirm Researchers

Security researchers have found that the developers of ComRAT, a complex remote administration tool, are still hard at work. Per an article published on its blog, G Data Software was able to successfully identify 46 different samples of the spyware and trace it to as far back as 2007. Some believe that the malware, otherwise known as ‘Turla’ and ...
Blog

Dark Technology: Are You (Unknowingly) Putting Your Organization At Risk?

Within the last 10 years, our communities have become dependent on technology to support their homes and their business relationships. It may even arrive at the assertion that 99.99% of the population in any developed society will be utilising technology in both direct and indirect ways, say by association with the use of online banking, ATMs, on...
Blog

10 Notorious Cyber Criminals Brought to Justice – No. 6

Last week, Tripwire published the story of Albert Gonzalez, a notorious hacker who was arrested in 2010 for his colorful record of cybercrime, including the 2009 breach against Heartland Payment Systems, Inc. that compromised 134 million credit cards. Tripwire now continues its series of some of the most notorious cyber criminals brought to justice...
Blog

Buying Illegal Goods on the Digital Underground

Recently, Tripwire reported on the launch of ‘Silk Road Reloaded,’ the newest iteration of the Silk Road underground market where users can purchase drugs and fake IDs. The fact that Silk Road has returned is a testament to users’ ongoing ability to purchase illegal goods online, not to mention merchants’ ability to sell these products. After all,...
Blog

Executive Cyber Intelligence Report: January 16, 2015

This report was prepared by The Institute for National Security Studies (INSS) and The Cyber Security Forum Initiative (CSFI) to create better cyber situational awareness (Cyber SA) of the nature and scope of threats and hazards to national security worldwide in the domains of cyberspace and open source intelligence. It is provided to Federal, State...
Blog

US and UK Set to Increase Cyber Security Cooperation Via 'Cyber War Games'

The United States and the UK have announced that they will be creating “cyber cells,” intelligence units which will share information and conduct simulated cyber attacks in an effort to enhance the security cooperation between the two countries. “We have got hugely capable cyber defences,” UK Prime Minister David Cameron said about the agreement. ...
Blog

Criminals Are After Your LinkedIn Account - Here is How to Protect it

Regularly in the news we hear about organisations having their Twitter or Facebook accounts compromised by cybercriminals - but they're not the only social media outlets which hackers and fraudsters have an interest in hijacking. Researchers at Symantec have warned this week of an increasing number of phishing emails being spammed out, claiming to...
Blog

Vulnerability Scoring 102

In my last post, I talked about the basics of vulnerability scoring in vulnerability management and the disparity that can exist when you score the subjective elements of a vulnerability. We looked at the variance that can exist within CVSSv2 and how a properly developed score can show a clear difference between two unique issues. This time, I want...
Blog

British Hacker Suspected of Defacing CENTCOM Social Media Sites

A Birmingham hacker who is believed to be fighting for the Islamic State in Iraq and Syria, better known as ‘ISIS,’ is suspected of having orchestrated the defacement of U.S. CENTCOM social media accounts earlier this week. Investigators believe that 20-year-old Junaid Hussain helped administrate a Twitter account that operated under the pseudonym ...
Blog

A Request To Threat Intelligence Providers

At Tripwire, we have recently seen increasing interest from our customers in being able to match up file changes found by our products with threat intelligence that comes from a variety of external sources. We have run into a common issue here when we have gotten down to the implementation details, and so I write this post as a plea to all the new,...
Blog

VERT Alert: January 2015 Patch Tuesday Analysis

Today’s VERT Alert addresses 8 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expects to ship ASPL-597 on Wednesday, January 14th. MS15-001 Microsoft Application Compatibility Infrastructure Elevation of Privilege Vulnerability CVE-2015-0002 ...
Blog

The Voice of the CISO: Interview with Thom Langford

Last year, we announced The Voice of the CISO, a new series in which we interview prominent individuals in the field to gain detailed insight into the mind of a CISO and to better understand their role within an organization. Our latest interview features Thom Langford, an information security professional who is the Director of Sapient’s Global...
Blog

‘Silk Road Reloaded’ Adopts I2P Anonymous Network and Darkcoins

‘Silk Road Reloaded,’ a new anonymous online drug market, draws upon a host of new anonymizing features, including I2P connectivity and the use of cryptocurrencies other than Bitcoin. By embracing I2P, the administrators of the new Silk Road iteration now welcome a service that, as opposed to Tor, is friendly to peer-to-peer connections and uses a...
Blog

10 Notorious Cyber Criminals Brought to Justice - #7

It’s 2015—another year for law enforcement agencies to find and arrest some of the most dangerous hackers. With this optimism for the New Year at heart, we now focus in on the story of yet another notorious cyber criminal brought to justice: Albert Gonzalez. Gonzalez, who is known as “Segvec,” “Soupnazi” and “J4guar” among Internet circles, is an...
Blog

Charlie Hebdo: Hacker Posts “Death to Charlie” Message With ISIS Flag on French Municipality Websites

A hacker has defaced the websites of a number of French municipalities with a message in support of the Wednesday attacks against the satirical French magazine Charlie Hebdo, a massacre which killed 12 including two police officers. The front pages of the hacked sites were seen to display the “black flag of Islam,” which has become a symbol of the...
Blog

Top Influencers in Security You Should Be Following in 2015

In December of 2011, Tripwire published a list of security’s top 25 influencers. More than three years later, we are pleased to announce a new list for 2015 -- The Infosec Avengers! For each influencer whom we have selected, we include their Twitter handle, blog URL and reasoning for selecting them. We also include their answer for what infosec...
Blog

Social Engineering: How Dangerous is Your Lunch Break?

Ever heard the phrase 'Loose lips sink ships?' If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch. Hitting the popular restaurants and cafes around the target location is a no-risk method for gathering data. If two or more coworkers are together for any length of time it’s almost...
Blog

Should Companies Strike Back at Hackers?

I was just reading an article about an FBI investigation of whether US banks are attacking their cyber attackers in an attempt to fight back. Along similar lines, we recently saw reports of Sony taking an offensive position by DDOS-ing sites hosting its content. The question of whether it makes sense to attack your cyber attackers isn't new—this has...