Blog

Blog

DNS Amplification - Protecting Unrestricted (Open) DNS Resolvers

In a prior post, I gave a broad overview of some of the challenges we face in securing unrestricted DNS resolvers. I presented a talk at BSides Las Vegas on the topic and wanted to take some time to delve into more technical details regarding some of the attacks we have seen, as well as review some mitigation strategies. You can find video of the...
Blog

Researcher Develops Method to Bypass iOS Passcode Limit on iPhone

A security researcher has come up with a method that would allow an attacker to bypass the iOS passcode limit on certain iPhone models. Sergei Skorobogatov's process consists of an attacker mirroring the Flash memory stored in an iPhone 5c's NAND cells. During a press conference back in March, FBI Director James Comey explained his agents could not...
Blog

10 Best Practices In IT Security Management Automation

In my last blog post, I introduced the topic of automation and how it can help improve security posture. In this post, we’ll be covering some of the risks automation can mitigate against. Data Breaches and Cyber Attacks A recent survey by ISACA on organization preparedness indicated that only 38% of businesses were confident they were prepared to...
Blog

FBI Director Says Covering Up Your Webcam with Tape 'A Good Thing'

FBI Director James Comey feels that covering up a computer's webcam with a piece of tape is "sensible" and "a good thing." In an interview commemorating 10 years of operation for the National Security Division (NSD), a body of the U.S. Department of Justice that leverages law enforcement, intelligence, and other government resources to respond to...
Blog

3 Questions to Gauge the Resiliency of Your Vulnerability Management Solution

Looking at the cyberthreat landscape, millions of new devices come online every day. But there’s a shortage of qualified cybersecurity workers to protect those devices once they come online. Additionally, in almost every case, it takes minutes or less to compromise them. Simply running more vulnerability scans to collect more data and generating...
Blog

Mobile Devices: Innovative, Productive... and a Huge Risk Factor?

It’s hard to believe that in such a relatively short period of time, smartphones and other mobile devices, such as tablets, have become so tightly woven into both our personal and work lives. And unlike desktop or laptop computers that are usually company-owned, personally-owned mobile devices are often filled with company related apps, data, email...
Blog

VERT Threat Alert: September 2016 Patch Tuesday Analysis

Today’s VERT Alert addresses 14 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expects to ship ASPL-689 on Wednesday, September 14th. Ease of Use (published exploits) to Risk Table Automated Exploit Easy...
Blog

My Summer 2016 Internship at Tripwire

My name is David. Now that you know my name, you should know technology is my passion. I've participated in the FIRST Robotics Competition, and I'm deeply knowledgeable about computer programming languages and software. But throughout my learning, I've always known cybersecurity would teach me and play an important part in my future career,...
Blog

Shark Ransomware Rebrands as Atom, Keeps Attractive Payment Model

Shark ransomware has rebranded itself as the Atom ransomware affiliate program but has kept a favorable payment model to attract criminal customers. First detected on 15 August, 2016, Shark is a ransomware-as-a-service (RaaS) platform that allows computer criminals with low levels of technical expertise to sit at the adult table and distribute crypto...
Blog

The Benefits of Sharing Information for IT and Security

Confidentiality, Integrity and Availability – those are the three pillars of the CIA triad model for information security. Here's something you might not have known: in reverse order, those same pillars apply to IT Operations. Think about it. In a world of agility and enablement, the availability, integrity and confidentiality of the systems and...
Blog

Cerber 3 Ransomware Virus Is Already Here

AVG security researcher Jakub Kroustek has recently discovered tracks of the Cerber 3 ransomware virus marking encrypted files with the .cerber3 file extension. Unlike previous variants of Cerber, for which decryptors have been already developed, this variant contains fixes that prevent malware researchers from decrypting the files. Since this virus...
Blog

Going Beyond the Firewall to Tackle Today’s Cyberthreats

Firewalls are staples of network security, and for years, they’ve played a part in keeping networks safe by restricting both incoming and outgoing network traffic. Along with antivirus software, they are among the oldest and most widely used cybersecurity tools. But what role should firewalls play in 2016 and beyond? One thing is clear: even though...
Blog

Philadelphia Ransomware Allows Attackers to Offer "Mercy"

The Philadelphia ransomware enables attackers to offer "mercy" to their victims by choosing to decrypt their files for free. Attackers are likely distributing Philadelphia, which is a new version of Stampado, via the use of phishing emails disguised as payment notices from Brazil's Ministério da Fazenda or the Ministry of Finance. ...
Blog

Cybercrime and Money – Cause and Effect

“Should we fear hackers? Intention is at the heart of this discussion.” – Kevin Mitnick In cybercrime, truth is in the eye of the beholder. And if in any other research or business field it is somehow easy to define cause and consequence, in cybercrime it is not. Perhaps it is due to its complexity and multi-layered character that cybercrime has...