Oct 23, 2017, 9:10 AM
An average organization has more than 50 technologies deployed that assist in keeping its most valued assets protected against a variety of attacks and adversaries but not enough experts to manage them. Moreover, how do organizations align their compliance efforts, defensive controls, and other security efforts with the business' goals?
Jun 8, 2017, 11:19 AM
A vulnerability was found by James Forshaw of Google Project Zero in January that exploits a bug in Windows COM Aggregate Marshaler that an attacker can use to elevate privileges. It gave Microsoft 90 days to patch, which they have with last month’s security updates.
May 31, 2017, 4:44 PM
It is 2017, and gaining unauthorized access to systems is getting easier and easier. Seems a Biker Gang gained access to a key database for Jeep vehicles. Using this database they were able to look up VIN's for 150 Jeep Wranglers in San Diego county, duplicate their keys, and make off with the vehicles which wound up in Mexico.
May 26, 2017, 3:37 PM
Much like the EternalBlue exploit that was released in April 2017 after being stolen from the NSA, Samba was discovered to have a remote code execution vulnerability as well. Dubbed ‘EternalRed’ by industry-types, this vulnerability dates as far as 2010. So even if you chose the red pill thinking Linux was a safer alternative, for 7 years you were just as vulnerable as those using Windows. Samba version 3.5.0, the version that introduced the flaw, was released in March 2010. The bug causing this vulnerability is in the is_known_pipename() function. The Samba project maintainers wrote an advisory on May 24th urging anyone running a vulnerable version (3.5.0 - 4.5.4/4.5.10/4.4.14) to install the critical patch as soon as possible or risk certain pwnage.
May 18, 2017, 3:11 PM
In Early April, an advisory was released for CVE-2017-0199, the vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files.Patches that were released included mitigation for Office 2007/2010/2013/2016 and Wordpad for Windows versions Vista/7/8/2008/2012. It's related to the Windows Object Linking and Embedding (OLE), it can be exploited through a Microsoft Word RTF (Rich Text Format) file, which contains an embedded OLE2link object. The code sends an HTTP request to a remote host and retrieves a .HTA (HTML Application) file. HTA files have been around since 1999 and have the ability to run scripting languages such as VBScript or JScript. For all intents and purposes they are essentially treated as an executable file when opened. Microsoft Word and Wordpad uses the file handler for application/hta through a COM object, which causes mshta.exe (Microsoft HTA application) execute the malicious script.
May 15, 2017, 8:56 AM
A few weeks ago ShadowBrokers released a dump of NSA/EquationGroup tools used to exploit various machines that they previously tried to auction off unsuccessfully. One of the exploits was for Windows SMB RCE which allowed an unauthenticated attacker to gain System-level privileges on target machines remotely by sending a specially crafted packet to a targeted SMB server. Microsoft quietly patched this as MS17-010 a month before, in March, before the dump was even made public. Although the dump was supposedly stolen around 2013, this affected Windows machines from Win2k up to Win2k16. Most reliable targets were Win7 and Win2k8 R2.
May 3, 2017, 2:53 PM
Preface: You likely don’t know me, and that’s ok. In fact, it’s generally how I like it to be. I want to change the world, not just plaster my name all over it as some sort of gratuitous ego stroke.
Apr 28, 2017, 6:00 PM
Security is a big field that continues to grow year after year. Companies around the world keep innovating and creating products that are prime for hacking. When you take a hard look at how to protect yourself, you begin to feel like this is just a big game of chess, moves and countermoves. Luckily though, you can turn this game of chess into a team sport. Adding a chess grandmaster to your team only seems fair.
Apr 12, 2017, 4:07 PM
Lately my focus has been on looking at traffic. Whether it’s the traffic visiting the AsTech website, traffic at a client site that seems to indicate they are under attack, or traffic on a LAN segment, traffic is flowing all the time. So, I started to wonder, what is all this traffic?
Mar 29, 2017, 9:17 PM
There are many tasks for a development team to take on in the cyber security world, some are small and extremely complex while others are simpler but far larger in scope. One item in this later group is a process of what I like to call augmentation, or third party support, and it can be truly grueling in its own fashion. For us, augmentation is the need to support and provide checks and balances for other security measures by using our position as the access and admission control arbiters.