Stay updated on the latest blogs from Milton Security.
CVE-2022-26809 is a RPC Runtime RCE vulnerability that does not require access before the attack. Here's what you need to know.
The Cyber Incident Reporting for Critical Infrastructure Act of 2022 is monumental. Here's what you need to know.
What are Domain Generation Algorithms (DGAs), how do they work, and how can I mitigate them?
Mean Time To Detect (MTTD) is a critical metric for analyzing your security posture. But what is it, how do you calculate it, and how can you reduce it?
With Russia and Ukraine plastered all over every media outlet recently, I was taking some time to reflect on what this meant for organizations.
With the war drums beating louder and louder every day and Russia moving troops and equipment around Ukraine, a broader dis-information campaign and cyber attacks against Ukraine started weeks ago.
2022 doesn't have to be like 2021 when it comes to cybersecurity. Here's 10 things to start working on now to make it a better year.
October is Cybersecurity Awareness Month. Follow along with us as we go back to the basics of protecting your brand and help your organization #BeCyberSmart.
You know how your users (and sometimes even yourself) get locked out of their accounts, and they don't know where they logged in exactly? Here's a tip for tracking down those elusive account lockouts.
Rest easy on your vacation this year by ensuring you have followed these top five cybersecurity readiness tips.
This is our final installment of our 12-week Q&A series. Unapologetically, we're not for everyone, and that's ok! But where we do fit, we have a huge impact.
With the overwhelming level of fear, uncertainty, and doubt around cybersecurity - FUD as we like to refer to it here at Milton, we often get asked how we stay so calm and how we keep up with all of the new vulnerabilities and exploits that are flooding the media.
A new 0-day exploit, dubbed PrintNightmare, has been discovered in the wild that is allowing attackers to gain access to Windows Domain Controllers (DC) and execute remote code.
After 14 years, and since we’re unashamedly a team of nerds and geeks here at Milton, it’s time to release our superhero origin story upon the world.
This is the ninth in a 12-part series where we crowdsource questions around cybersecurity basics and answer them in an attempt to increase knowledge and awareness around network attacks and data security.
This is the eighth in a 12-part series where we crowdsource questions around cybersecurity basics and answer them in an attempt to increase knowledge and awareness around network attacks and data security. This week we discuss IoC, IoT and ML.
We interrupt this week’s scheduled Q&A on data collection and identification of suspicious activity to talk about the May 7th breach of Colonial Pipeline.
7th installment of Milton's Q&A, addressing the what and how of attack vectors: What are attack vectors? How do hackers use attack vectors? What kind of impact can attack vectors have? How do we use attack vectors against malicious actors?
6th installment of Milton's Q&A, this time diving deeper into data collection through our Milton Argos Collection Engine (MACe)
In an effort to strengthen and broaden the ability to support customers, Milton announces the launch of a new range of on-demand Expert Services.
5th installment of Milton's Q&A. This week we answer the question: How does incident response work?
4th installment of Milton's Q&A regarding the question of whether we can work with a client's tools.
Personal information is being shared across the internet, but not only by hackers.
3rd installment of Milton's Q&A. This week we are looking at the difference between MSSPs and MDR.
This is the second in a 12-part series where we crowdsource questions around cybersecurity basics and answer them in an attempt to increase knowledge and awareness around network attacks and data security.
This is the first in a 12-part series where we crowdsource questions around cybersecurity basics and answer them in an attempt to increase knowledge and awareness around network attacks and data security.
It has been 15 days since the public announcement of the Exchange Vulnerabilities. It has also been one of the busiest periods for almost all IT shops, across every size of organization because of the patching, the forensics, the mitigations, etc.
Today in Spokane Washington Federal Court, the US Government unsealed indictments against two Chinese citizens for numerous charges related to hacking, gaining illegal access to systems, wire fraud, identity theft, and theft of trade secrets.
History as we know it, is recorded; somewhere by someone or something. We learn from these historical documents. They are entered as evidence in legal proceedings. We use these documents and pictures as a means of learning and education, to ensure we do not repeat past failures.
Of course when Jim was writing his last blog post, the embargo was ending on two major vulnerabilities within a range of CPU processors (aka Spectre & Meltdown). With Spectre & Meltdown (all three current variants), we are looking at a vulnerability possibly as far reaching, if not worse than heartbleed and bash bug.
First, this is not one of those far reaching blog posts full of marketing speak, fear, uncertainty or doubt to get you to buy blinky lights.
An average organization has more than 50 technologies deployed that assist in keeping its most valued assets protected against a variety of attacks and adversaries but not enough experts to manage them. Moreover, how do organizations align their compliance efforts, defensive controls, and other security efforts with the business' goals?
A vulnerability was found by James Forshaw of Google Project Zero in January that exploits a bug in Windows COM Aggregate Marshaler that an attacker can use to elevate privileges. It gave Microsoft 90 days to patch, which they have with last month’s security updates.
It is 2017, and gaining unauthorized access to systems is getting easier and easier. Seems a Biker Gang gained access to a key database for Jeep vehicles.
Much like the EternalBlue exploit that was released in April 2017 after being stolen from the NSA, Samba was discovered to have a remote code execution vulnerability as well. Dubbed ‘EternalRed’ by industry-types, this vulnerability dates as far as 2010.
In Early April, an advisory was released for CVE-2017-0199, the vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files.
A few weeks ago ShadowBrokers released a dump of NSA/EquationGroup tools used to exploit various machines that they previously tried to auction off unsuccessfully. One of the exploits was for Windows SMB RCE which allowed an unauthenticated attacker to gain System-level privileges on target machines remotely.
Preface: You likely don’t know me, and that’s ok. In fact, it’s generally how I like it to be. I want to change the world, not just plaster my name all over it as some sort of gratuitous ego stroke.
When you take a hard look at how to protect yourself, you begin to feel like this is just a big game of chess, moves and countermoves. Luckily though, you can turn this game of chess into a team sport. Adding a chess grandmaster to your team only seems fair.
Lately my focus has been on looking at traffic. Whether it’s the traffic visiting the AsTech website, traffic at a client site that seems to indicate they are under attack, or traffic on a LAN segment, traffic is flowing all the time. So, I started to wonder, what is all this traffic?
There are many tasks for a development team to take on in the cyber security world, some are small and extremely complex while others are simpler but far larger in scope.
I read articles almost daily about the skills gap and lack of qualified personnel within the Information Security profession. Just recently, Forbes ran an article that stated by 2019 there will be a shortage of 2 million cyber security jobs. Entrepreneur ran an article entitled “Why you Should Consider Outsourcing Computer Security.”
I had a couple of weeks of transition and I was talking with my friend Jim McMurry and he was telling me he could hardly believe he started his company, Milton Security, 10 years ago. Wow!
This is an important year for me personally, and for the Milton family. Since starting Milton Security in 2007 I have always tried to make every new hire, and every new customer, a part of the Milton Family.
German Prosecutor Office in Cologne and the German Federal Police announced today they have arrested a British National who they are accusing of being the mastermind behind last years Internet of Things attack (MIRAI attack).
Over the past 10 years that we've grown Milton Security, our strategy has always been to assist our clients in mitigating risk, securing their assets and to go above & beyond expectations. Now we are improving our strategy to include a SOC Service.