Blog

Blog

VERT Threat Alert: September 2016 Patch Tuesday Analysis

Today’s VERT Alert addresses 14 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expects to ship ASPL-689 on Wednesday, September 14th. Ease of Use (published exploits) to Risk Table Automated Exploit Easy...
Blog

My Summer 2016 Internship at Tripwire

My name is David. Now that you know my name, you should know technology is my passion. I've participated in the FIRST Robotics Competition, and I'm deeply knowledgeable about computer programming languages and software. But throughout my learning, I've always known cybersecurity would teach me and play an important part in my future career,...
Blog

Shark Ransomware Rebrands as Atom, Keeps Attractive Payment Model

Shark ransomware has rebranded itself as the Atom ransomware affiliate program but has kept a favorable payment model to attract criminal customers. First detected on 15 August, 2016, Shark is a ransomware-as-a-service (RaaS) platform that allows computer criminals with low levels of technical expertise to sit at the adult table and distribute...
Blog

The Benefits of Sharing Information for IT and Security

Confidentiality, Integrity and Availability – those are the three pillars of the CIA triad model for information security. Here's something you might not have known: in reverse order, those same pillars apply to IT Operations. Think about it. In a world of agility and enablement, the availability, integrity and confidentiality of the systems and...
Blog

Cerber 3 Ransomware Virus Is Already Here

AVG security researcher Jakub Kroustek has recently discovered tracks of the Cerber 3 ransomware virus marking encrypted files with the .cerber3 file extension. Unlike previous variants of Cerber, for which decryptors have been already developed, this variant contains fixes that prevent malware researchers from decrypting the files. Since this virus...
Blog

Going Beyond the Firewall to Tackle Today’s Cyberthreats

Firewalls are staples of network security, and for years, they’ve played a part in keeping networks safe by restricting both incoming and outgoing network traffic. Along with antivirus software, they are among the oldest and most widely used cybersecurity tools. But what role should firewalls play in 2016 and beyond? One thing is clear: even though...
Blog

Philadelphia Ransomware Allows Attackers to Offer "Mercy"

The Philadelphia ransomware enables attackers to offer "mercy" to their victims by choosing to decrypt their files for free. Attackers are likely distributing Philadelphia, which is a new version of Stampado, via the use of phishing emails disguised as payment notices from Brazil's Ministério da Fazenda or the Ministry of Finance. ...
Blog

Cybercrime and Money – Cause and Effect

“Should we fear hackers? Intention is at the heart of this discussion.” – Kevin Mitnick In cybercrime, truth is in the eye of the beholder. And if in any other research or business field it is somehow easy to define cause and consequence, in cybercrime it is not. Perhaps it is due to its complexity and multi-layered character that cybercrime has...
Blog

French Dark Web Posts Ad for Content Cleaner to be Paid in Stolen Goods

The French underground has posted a job ad for a dark web content "cleaner" who will be paid for their efforts in stolen goods. Trend Micro threat researcher Cedric Pernet came across the posting (which is written in French) after making other discoveries in a series of French underground marketplaces. According to the ad, the dark web marketplace...
Blog

Report claims national security was put at risk by the OPM data breach

A Congressional investigation into the devastating hack of the US government's Office of Personnel Management (OPM) has detailed shortcomings in the organisation's security and made recommendations for other federal departments to prevent the same from happening to them. The hefty 227-page report doesn't pull its punches about the seriousness of the...
Blog

Evolution of a 'Cameras Are Everywhere' Society

I remember when I first learned about some of the powerful spy satellites orbiting the earth. Some of the rumors stated the cameras on these machines were so accurate that they could read a car license plate from space. The idea that such technology existed back then was amazing. Now, some of the newer satellites are putting those early spy rumors...
Blog

Hutton Hotel Warns of Payment Card Breach That Lasted Over 3 Years

Hutton Hotel became the latest hospitality company to warn customers of a data breach that may have compromised their payment card details. The Nashville, Tenn.-based upscale hotel announced the security incident on Friday, stating it was notified of the potential breach by its payment processor. Subsequently, the company said it began an...
Blog

Yelp Will Award Up to $15K for Exploits Found in Bug Bounty Program

Crowd-sourced review service Yelp says it will award researchers up to 15,000 USD for reporting exploits as part of its newly public bug bounty program. The company successfully ran a private bug-bounty program for the past two years, during which it worked with private researchers and bug bounty hunters to fix as many as 100 vulnerabilities. But to...
Blog

The "Hows and Whys" of an Incident Management Call

Recently, I had a meeting with a potential customer who was looking to invest in Tripwire's portfolio. We got to talking about various aspects of information security—in particular, when companies discover, react to and investigate potential security breaches. The conversation took me back to when I worked in information security as a technical...