Hot Topics
Talos on Phishing: Hook, Line and Sinker: Catching Unsuspecting Users Off Guard -

Cisco’s research team Talos wrote a interesting article on their research on Phishing. The original post can. 

5 days ago | 0
Insurance Fraud via Internet of Things -

Recently, Beam Technologies announced it would be creating a dental insurance around its connected toothbrushes.. 

7 days ago | 0
To Improve Security, Governments Need Accurate, Timely Intelligence -

State Tech Magazine posted a great article on Threat Intelligence. Click here for the original article.  State. 

1 week ago | 0

Talos on Phishing: Hook, Line and Sinker: Catching Unsuspecting Users Off Guard

By Joey Muniz | On Wed, Jul 29th, 2015 - No Comments »
phishing-attack

Cisco’s research team Talos wrote a interesting article on their research on Phishing. The original post can be found HERE. For those that don’t know what Phishing is, its the cyber attack where a malicious party pretends to be a legitimate source with the goal to trick a victim into clicking a email, accessing a website, or just giving up sensitive data. Here is the Talos article. . 

Insurance Fraud via Internet of Things

By Blog | On Mon, Jul 27th, 2015 - No Comments »
59763198_thumbnail

Recently, Beam Technologies announced it would be creating a dental insurance around its connected toothbrushes. Nest also announced it was teaming up with another insurance company, American Family. As a matter of fact, for the better and the worst, this is exactly the kind of connection which is going to raise interest in hacking and/or infecting connected objects. Insurance Fraud. Imagine. 

To Improve Security, Governments Need Accurate, Timely Intelligence

By Blog | On Mon, Jul 27th, 2015 - No Comments »
cybersecurity-image

State Tech Magazine posted a great article on Threat Intelligence. Click here for the original article.  State and local agencies have many options for free sources of actionable security information. Effective security starts with accurate intelligence. Unfortunately, agencies short on budget and personnel may often lack timely access to information they can use to better protect their. 

OPM Director Katherine Archuleta Resigns After Massive Personnel Data Hack

By Joey Muniz | On Wed, Jul 22nd, 2015 - No Comments »
OfficeHack2

Well it has been a tough time for Katherine Archuleta. With the recent cyber breach and other pressures, she has decided to step down. The Wall Street Journal wrote a great post on this HERE. You can learn more about the breach on datalossdb.org. Below is taken from the Wall Street Journal post. WASHINGTON— Katherine Archuleta, the embattled director of the Office of Personnel Management,. 

Analyze Malware With Cuckoo Sandbox

By Joey Muniz | On Mon, Jul 20th, 2015 - No Comments »
cuckoo

People have asked me to recommend a tool that can be used to analyze files for viruses that does more than standard anti-virus. Usually the need is to prove something being flagged by a security product is actually malicious verses a false positive alert. There are enterprise level sandbox solutions such as Cisco’s ThreatGRID sandbox that offer this (more on this found HERE) however one. 

One More Flash Exploit in the Wild

By Blog | On Sun, Jul 19th, 2015 - Comments Off on One More Flash Exploit in the Wild

Fortinet’s FortiGuard Labs has detected a new Flash exploit (MD5:db5df99de775af285e7f1b5355a6bee5) that leverages a vulnerability patched with Flash 17.0.0.188. This exploit uses the classic Flash Player Vector corruption technique. Below is the AS3 code that is responsible for the spray. The original article can be found here As you can see below, it loads the layer 2 Flash to corrupt. 

Corporate Cyber Espionage and Baseball

By Aamir Lakhani | On Fri, Jul 17th, 2015 - Comments Off on Corporate Cyber Espionage and Baseball
cyberEspionage

I don’t honestly know how many times I have used my site to emphasize the growing concern of corporate espionage in relation to cyber security threats. The Washington Post reported that law enforcement officials are looking into the St. Louis, MO Cardinals baseball franchise to determine if they breached computer systems and ultimately stole data belonging to the Houston Astros. This will. 

Feds bust through huge Tor-hidden services using Malware

By Blog | On Thu, Jul 16th, 2015 - Comments Off on Feds bust through huge Tor-hidden services using Malware
feds bust TOR

A newly unsealed FBI search warrant application illustrates yet another example of how the government deploys malware and uses sophisticated exploits in an attempt to bust up child pornography rings. The 28-page FBI affidavit (text-only, possibly NSFW) was unsealed in a federal court in Brooklyn, New York earlier this month. It describes a North Carolina server hosting a Tor hidden service. 

Darkode hacking forum forced offline

By Aamir Lakhani | On Thu, Jul 16th, 2015 - Comments Off on Darkode hacking forum forced offline
darkweb

The Darkode forum, which was created about six years ago, can no longer be accessed Darkode – anotorious hacking forum used by Lizard Squad and other cybercriminals – has been shut down after an investigation carried out by authorities in 20 countries. “We have dismantled a cyber-hornets’ nest… which was believed by many, including the hackers themselves, to. 

Flash and Shock – New Memory Corruption in Adobe

By Aamir Lakhani | On Wed, Jul 15th, 2015 - Comments Off on Flash and Shock – New Memory Corruption in Adobe
Adobe-Shockwave-Player

Today, Adobe has released a new announcement of vulnerabilities, 3 of which were discovered by researchers at FortiGuard Labs. Adobe Flash and Shockwave continue to be a challenge for organizations and vendors to keep secure. Memory corruptions can lead to the development of zero-day exploits against systems and there are overlaps in feature sets between versions of Shockwave and Flash. FortiGuard.