Jan 4, 2018, 11:00 AM
Of course when Jim was writing his last blog post, the embargo was ending on two major vulnerabilities within a range of CPU processors (aka Spectre & Meltdown).  With Spectre & Meltdown (all three current variants), we are looking at a vulnerability possibly as far reaching, if not worse than heartbleed and bash bug.  At its basis, it appears this attack can advance the chips prediction processes out of order, forcing a wrong process and permitting access to a process that wouldn’t intentionally have occurred.
Jan 3, 2018, 2:51 PM
First, this is not one of those far reaching blog posts full of marketing speak, fear, uncertainty or doubt to get you to buy blinky lights. My personal goals for 2018 include, writing, sharing, and helping others more often. This past weekend, I started thinking about how I would accomplish this in 2018, when a Talking Heads song popped into my head, and I found it very apropos. Growing up in the 70s and 80s I was introduced to a lot of great music (some call it classic rock, but it is just great music). The song that came to me was “Once In A Lifetime” and I found so many corollaries to Cyber Security in this song, I felt I should share with you.
Oct 23, 2017, 9:10 AM
An average organization has more than 50 technologies deployed that assist in keeping its most valued assets protected against a variety of attacks and adversaries but not enough experts to manage them. Moreover, how do organizations align their compliance efforts, defensive controls, and other security efforts with the business' goals? 
Jun 8, 2017, 11:19 AM
A vulnerability was found by James Forshaw of Google Project Zero in January that exploits a bug in Windows COM Aggregate Marshaler that an attacker can use to elevate privileges. It gave Microsoft 90 days to patch, which they have with last month’s security updates.
May 31, 2017, 4:44 PM
It is 2017, and gaining unauthorized access to systems is getting easier and easier. Seems a Biker Gang gained access to a key database for Jeep vehicles.  Using this database they were able to look up VIN's for 150 Jeep Wranglers in San Diego county, duplicate their keys, and make off with the vehicles which wound up in Mexico.
May 26, 2017, 3:37 PM
Much like the EternalBlue exploit that was released in April 2017 after being stolen from the NSA, Samba was discovered to have a remote code execution vulnerability as well.  Dubbed ‘EternalRed’ by industry-types, this vulnerability dates as far as 2010. So even if you chose the red pill thinking Linux was a safer alternative, for 7 years you were just as vulnerable as those using Windows. Samba version 3.5.0, the version that introduced the flaw, was released in March 2010. The bug causing this vulnerability is in the is_known_pipename() function.  The Samba project maintainers wrote an advisory on May 24th urging anyone running a vulnerable version (3.5.0 - 4.5.4/4.5.10/4.4.14) to install the critical patch as soon as possible or risk certain pwnage.
May 18, 2017, 3:11 PM
In Early April, an advisory was released for CVE-2017-0199, the vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files.Patches that were released included mitigation for Office 2007/2010/2013/2016 and Wordpad for Windows versions Vista/7/8/2008/2012. It's related to the Windows Object Linking and Embedding (OLE), it can be exploited through a Microsoft Word RTF (Rich Text Format) file, which contains an embedded OLE2link object. The code sends an HTTP request to a remote host and retrieves a .HTA (HTML Application) file. HTA files have been around since 1999 and have the ability to run scripting languages such as VBScript or JScript. For all intents and purposes they are essentially treated as an executable file when opened. Microsoft Word and Wordpad uses the file handler for application/hta through a COM object, which causes mshta.exe (Microsoft HTA application) execute the malicious script.
May 15, 2017, 8:56 AM
A few weeks ago ShadowBrokers released a dump of NSA/EquationGroup tools used to exploit various machines that they previously tried to auction off unsuccessfully. One of the exploits was for Windows SMB RCE which allowed an unauthenticated attacker to gain System-level privileges on target machines remotely by sending a specially crafted packet to a targeted SMB server. Microsoft quietly patched this as MS17-010 a month before, in March, before the dump was even made public. Although the dump was supposedly stolen around 2013, this affected Windows machines from Win2k up to Win2k16. Most reliable targets were Win7 and Win2k8 R2.
May 3, 2017, 2:53 PM
Preface: You likely don’t know me, and that’s ok. In fact, it’s generally how I like it to be. I want to change the world, not just plaster my name all over it as some sort of gratuitous ego stroke.
Apr 28, 2017, 6:00 PM
Security is a big field that continues to grow year after year.  Companies around the world keep innovating and creating products that are prime for hacking.  When you take a hard look at how to protect yourself, you begin to feel like this is just a big game of chess, moves and countermoves.  Luckily though, you can turn this game of chess into a team sport. Adding a chess grandmaster to your team only seems fair.