Need to report an incident? +1 (888) 674.9001


Stay updated on the latest blogs from Milton Security.

What You Need to Know About CVE-2022-26809

Apr 14, 2022

CVE-2022-26809 is a RPC Runtime RCE vulnerability that does not require access before the attack. Here's what you need to know.

What You Need to Know About the Cyber Incident Reporting for Critical Infrastructure Act of 2022

Mar 23, 2022

The Cyber Incident Reporting for Critical Infrastructure Act of 2022 is monumental. Here's what you need to know.

The Domain Generation Algorithm Dilemma

Mar 18, 2022

What are Domain Generation Algorithms (DGAs), how do they work, and how can I mitigate them?

Mean Time To Detect: What does that mean to me?

Feb 11, 2022

Mean Time To Detect (MTTD) is a critical metric for analyzing your security posture. But what is it, how do you calculate it, and how can you reduce it?

4 Reasons Why You Need MDR, Right Now!

Jan 28, 2022

With Russia and Ukraine plastered all over every media outlet recently, I was taking some time to reflect on what this meant for organizations.

CISA Cybersecurity Measures for Russian APTs

Jan 19, 2022

With the war drums beating louder and louder every day and Russia moving troops and equipment around Ukraine, a broader dis-information campaign and cyber attacks against Ukraine started weeks ago.

New Year, Still the Same Issues

Jan 6, 2022

2022 doesn't have to be like 2021 when it comes to cybersecurity. Here's 10 things to start working on now to make it a better year.

October is Cybersecurity Awareness Month

Oct 1, 2021

October is Cybersecurity Awareness Month. Follow along with us as we go back to the basics of protecting your brand and help your organization #BeCyberSmart.

Friday Tip: One way to track down elusive account lockouts

Jul 16, 2021

You know how your users (and sometimes even yourself) get locked out of their accounts, and they don't know where they logged in exactly? Here's a tip for tracking down those elusive account lockouts.

Top 5 Cybersecurity Readiness Tips Before You Go On Vacation

Jul 15, 2021

Rest easy on your vacation this year by ensuring you have followed these top five cybersecurity readiness tips.

Why Choose Milton?

Jul 8, 2021

This is our final installment of our 12-week Q&A series. Unapologetically, we're not for everyone, and that's ok! But where we do fit, we have a huge impact.

Fear, Uncertainty, and Doubt - Oh My!

Jul 1, 2021

With the overwhelming level of fear, uncertainty, and doubt around cybersecurity - FUD as we like to refer to it here at Milton, we often get asked how we stay so calm and how we keep up with all of the new vulnerabilities and exploits that are flooding the media.

PrintNightmare: 0-Day Exploit for Windows Domain Server Print Spooler

Jul 1, 2021

A new 0-day exploit, dubbed PrintNightmare, has been discovered in the wild that is allowing attackers to gain access to Windows Domain Controllers (DC) and execute remote code.

Milton Security - The Origin Story

Jun 24, 2021

After 14 years, and since we’re unashamedly a team of nerds and geeks here at Milton, it’s time to release our superhero origin story upon the world.

Take a tour of the Milton SOC

May 27, 2021

This is the ninth in a 12-part series where we crowdsource questions around cybersecurity basics and answer them in an attempt to increase knowledge and awareness around network attacks and data security.

Threat Hunting: IoC, IoT and ML

May 20, 2021

This is the eighth in a 12-part series where we crowdsource questions around cybersecurity basics and answer them in an attempt to increase knowledge and awareness around network attacks and data security. This week we discuss IoC, IoT and ML.

A recap on the Colonial Pipeline ransomware attack

May 13, 2021

We interrupt this week’s scheduled Q&A on data collection and identification of suspicious activity to talk about the May 7th breach of Colonial Pipeline.

What are attack vectors? How are they used?

May 7, 2021

7th installment of Milton's Q&A, addressing the what and how of attack vectors: What are attack vectors? How do hackers use attack vectors? What kind of impact can attack vectors have? How do we use attack vectors against malicious actors?

How we collect data [Part 2]

Apr 30, 2021

6th installment of Milton's Q&A, this time diving deeper into data collection through our Milton Argos Collection Engine (MACe)

Announcing the Launch of Milton's Expert Services

Apr 26, 2021

In an effort to strengthen and broaden the ability to support customers, Milton announces the launch of a new range of on-demand Expert Services.

How does incident response work?

Apr 22, 2021

5th installment of Milton's Q&A. This week we answer the question: How does incident response work?

Do you work with [insert preferred tool here]?

Apr 15, 2021

4th installment of Milton's Q&A regarding the question of whether we can work with a client's tools.

Sharing is Not Caring

Apr 13, 2021

Personal information is being shared across the internet, but not only by hackers.

What's the difference between MSSP and MDR?

Apr 8, 2021

3rd installment of Milton's Q&A. This week we are looking at the difference between MSSPs and MDR.

What do we do with the data?

Apr 1, 2021

This is the second in a 12-part series where we crowdsource questions around cybersecurity basics and answer them in an attempt to increase knowledge and awareness around network attacks and data security.

How do we collect data?

Mar 25, 2021

This is the first in a 12-part series where we crowdsource questions around cybersecurity basics and answer them in an attempt to increase knowledge and awareness around network attacks and data security.

Exchange Vulnerabilities, 15 Days Later

Mar 15, 2021

It has been 15 days since the public announcement of the Exchange Vulnerabilities. It has also been one of the busiest periods for almost all IT shops, across every size of organization because of the patching, the forensics, the mitigations, etc.

CHINA Caught Red Handed

Jul 21, 2020

Today in Spokane Washington Federal Court, the US Government unsealed indictments against two Chinese citizens for numerous charges related to hacking, gaining illegal access to systems, wire fraud, identity theft, and theft of trade secrets.

It's Our Birthday

May 12, 2020

13th Anniversary of the founding of Milton Security !!!

History Recorded, Logs and All The Things

Dec 14, 2018

History as we know it, is recorded; somewhere by someone or something. We learn from these historical documents. They are entered as evidence in legal proceedings. We use these documents and pictures as a means of learning and education, to ensure we do not repeat past failures.

Spectre and Meltdown : Burning Down The House

Jan 4, 2018

Of course when Jim was writing his last blog post, the embargo was ending on two major vulnerabilities within a range of CPU processors (aka Spectre & Meltdown). With Spectre & Meltdown (all three current variants), we are looking at a vulnerability possibly as far reaching, if not worse than heartbleed and bash bug.

Happy New Year, Same as the Old Year

Jan 3, 2018

First, this is not one of those far reaching blog posts full of marketing speak, fear, uncertainty or doubt to get you to buy blinky lights.

Security is not a project

Oct 23, 2017

An average organization has more than 50 technologies deployed that assist in keeping its most valued assets protected against a variety of attacks and adversaries but not enough experts to manage them. Moreover, how do organizations align their compliance efforts, defensive controls, and other security efforts with the business' goals?

CVE-2017-0213: Windows COM Privilege Escalation Vulnerability

Jun 8, 2017

A vulnerability was found by James Forshaw of Google Project Zero in January that exploits a bug in Windows COM Aggregate Marshaler that an attacker can use to elevate privileges. It gave Microsoft 90 days to patch, which they have with last month’s security updates.

Biker Gang uses hacking skills

May 31, 2017

It is 2017, and gaining unauthorized access to systems is getting easier and easier. Seems a Biker Gang gained access to a key database for Jeep vehicles.

EternalRed - CVE-2017-7494

May 26, 2017

Much like the EternalBlue exploit that was released in April 2017 after being stolen from the NSA, Samba was discovered to have a remote code execution vulnerability as well. Dubbed ‘EternalRed’ by industry-types, this vulnerability dates as far as 2010.

Analysis of CVE-2017-0199, MS Word Threats are back

May 18, 2017

In Early April, an advisory was released for CVE-2017-0199, the vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files.

M17-010 EternalBlue

May 15, 2017

A few weeks ago ShadowBrokers released a dump of NSA/EquationGroup tools used to exploit various machines that they previously tried to auction off unsuccessfully. One of the exploits was for Windows SMB RCE which allowed an unauthenticated attacker to gain System-level privileges on target machines remotely.

I Wanna Change the World

May 3, 2017

Preface: You likely don’t know me, and that’s ok. In fact, it’s generally how I like it to be. I want to change the world, not just plaster my name all over it as some sort of gratuitous ego stroke.

Cyber Security is a team sport, Stack Your Team!

Apr 28, 2017

When you take a hard look at how to protect yourself, you begin to feel like this is just a big game of chess, moves and countermoves. Luckily though, you can turn this game of chess into a team sport. Adding a chess grandmaster to your team only seems fair.

Known vs Unknown

Apr 12, 2017

Lately my focus has been on looking at traffic. Whether it’s the traffic visiting the AsTech website, traffic at a client site that seems to indicate they are under attack, or traffic on a LAN segment, traffic is flowing all the time. So, I started to wonder, what is all this traffic?

Not all development tasks bring on Rock Star feelings

Mar 29, 2017

There are many tasks for a development team to take on in the cyber security world, some are small and extremely complex while others are simpler but far larger in scope.

Finding a Partner in Security

Mar 27, 2017

I read articles almost daily about the skills gap and lack of qualified personnel within the Information Security profession. Just recently, Forbes ran an article that stated by 2019 there will be a shortage of 2 million cyber security jobs. Entrepreneur ran an article entitled “Why you Should Consider Outsourcing Computer Security.”

Sometimes you gotta change the game

Mar 24, 2017

I had a couple of weeks of transition and I was talking with my friend Jim McMurry and he was telling me he could hardly believe he started his company, Milton Security, 10 years ago. Wow!

The tetractys, or how I started something big and want you to be part of it

Mar 21, 2017

This is an important year for me personally, and for the Milton family. Since starting Milton Security in 2007 I have always tried to make every new hire, and every new customer, a part of the Milton Family.

German Police Arrest MIRAI Mastermind

Feb 23, 2017

German Prosecutor Office in Cologne and the German Federal Police announced today they have arrested a British National who they are accusing of being the mastermind behind last years Internet of Things attack (MIRAI attack).

Let's talk about SOC baby, let's talk about you and me

Feb 15, 2017

Over the past 10 years that we've grown Milton Security, our strategy has always been to assist our clients in mitigating risk, securing their assets and to go above & beyond expectations. Now we are improving our strategy to include a SOC Service.