Lights, Case, Action!
LogRhythm released Case Management in its most recent update, and while I could wax lyrical about the merits of why you should be using this feature, I won’t. Instead, I’ll show you a brief video demonstration of the new feature…
Read More
February 13, 2015
Detecting Lateral Movement From ‘Pass the Hash’ Attacks
Pass-the-hash attacks exploiting Windows operating systems aren’t anything new, in fact they’ve been around for donkey’s years; however, despite the exploit being nearly two decades old, still not much is known about the attack vector. So, in this post, I’ll…
Read More
February 3, 2015
Sharing Threat Intelligence
After the breach of Sony Pictures by North Korea, legislative attention has come back to cybersecurity. Its primary goal has been the sharing of threat information, allowing private companies to integrate their ‘indicators’ — pieces of information that have been…
Read More
January 29, 2015
The Long Road to Securing America’s Digital Infrastructure
As the US pioneered the Internet, so too the country is pioneering this ever changing information age. With this effort comes a responsibility for all organizations, both private and public, in all industries to protect client and consumer information. On…
Read More
January 26, 2015
War Game Cyber Attacks
Last week Barack Obama and David Cameron announced that the US and UK would implement a rolling program of “war game” cyber attacks on each other, which will be conducted by the FBI, GCHQ and MI5. Targeting critical national infrastructure,…
Read More
January 21, 2015
Catching the “Inception Framework” Phishing Attack
Posted by: Tony Massé
A new sophisticated, layered and targeted malware has been hitting Russia and Russian interests lately, and is starting to spread out. This has been named “Inception Framework” because of its massively layered design, in reference to the 2010 “Inception” movie.…
Read More
January 14, 2015