Blog

Blog

Inside The Mind Of A Former Black Hat Hacker

Image   Information security professionals are all too familiar with the work of black hat hackers. These individuals seek to gain unauthorized access to enterprises’ computer networks by exploiting security vulnerabilities – malicious activity which frequently threatens the personal and/or financial information of millions of...
Blog

OpenSSL to Fix 'High' Severity Security Flaw

Image   The OpenSSL Project, a collaborative effort designed to develop an open source toolkit that implements SSL and TLS, has announced that it will be fixing a number of security flaws on Thursday, one of which it has labeled “high” severity. The initiative made the announcement in a message circulated yesterday. “The OpenSSL...
Blog

VERT Threat Alert: March 2015 Patch Tuesday Analysis

Image   Today’s VERT Alert addresses 14 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expects to ship ASPL-605 on Wednesday, March 11. MS15-018 Multiple Memory Corruption Vulnerabilities in Internet Explorer MULTIPLE VBScript Memory...
Blog

The ‘ABC’ of the ‘APT’

Image The term APT (Advanced Persistent Threat), like many other acronyms in the world of IT/Information/Cyber Security entered our vocabulary some years ago, along with other partnering phrases, such as Advanced Evasion Techniques (AET), which at the time took the headlines as something new. Whilst these new outlined logical dangers...
Blog

Demystifying iOS Enterprise Certificates

Image For the past several months, the major threats to mobile security, especially within large enterprises, have relied on exploiting one thing—iOS Enterprise Certificates. With this part of Apple’s framework seemingly a significant source of danger, we’re taking a look at iOS Enterprise certificates from a mobile security...
Blog

Report: Nearly Half of Known Attacks Leverage Old Vulnerabilities

Image According to a recent report, companies are failing to properly patch and update their systems despite the disclosure of threatening vulnerabilities. The 2015 Cyber Risk Report (PDF) produced by HP analyzing last year’s threat landscape found that as many as 44 percent of breaches were the result of attackers leveraging a...
Blog

Samba Vulnerability CVE-2015-0240 Detection & Remediation

Image   Updated Tuesday, Feb. 24, 2015, 2:11 PM: Added content for Tripwire Enterprise customers to find Samba in their environment. A major vulnerability (CVE-2015-0240) has been discovered in Samba, which is a widely used and distributed SMB/CIFS Linux/Unix application for interoperability with Microsoft Windows. Samba provides...
Blog

The Trouble with (Asset) Identity

Image Have you ever had your identity stolen? Or perhaps an identity crisis? I hope for your sake the answer is "no."  However, if it's yes, you are in good company. Computing devices, which I'll loosely refer to as "assets," often change their identity, and at times even have it stolen (as a side note, NIST has a much broader...
Blog

The Startup Problem

Image Last month, Michal Nemcok blogged about the lack of security in the Progressive Insurance diagnostic monitoring dongle. By hacking the monitoring device, someone may be able to gain access to and change the behavior of the car, itself. Now, this is serious stuff – vulnerabilities that might impact the operation of the thing that...
Blog

Unconventional Security Conventions

Image In the face of the current wave of cyber threats, the U.S. government announced this week in Washington DC that as part of the Homeland Security initiative the current administration is creating a new agency called the Cyber Threat Intelligence Integration Centre (CTIIP) to monitor cybersecurity threats by acquiring, pooling and...
Blog

VERT Threat Alert: February 2015 Patch Tuesday Analysis

Image   Today’s VERT Alert addresses 9 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expects to ship ASPL-601 on Wednesday, February 11. MS15-009 Multiple Memory Corruption Vulnerabilities in Internet Explorer MULTIPLE Multiple Elevation of...
Blog

Microsoft Patches Dangerous Group Policy Vulnerability

Image   In February’s Patch Tuesday, Microsoft issued an update to fix a privately reported critical vulnerability in Group Policy that could  allow potential attackers to achieve remote code execution (RCE) in domain networks. If successfully exploited, an attacker could gain complete control of a vulnerable system, install programs,...
Blog

11 Essential Bug Bounty Programs of 2015

Image   With cybercrime and major hacking incidents reaching epidemic proportions, the importance of locating application-layer vulnerabilities is rising. Developers and companies are constantly striving to scan their code and improve code integrity in the early development stages, but no application is completely vulnerability-free...
Blog

Threat Intelligence: Reduce the Gap

Image Major cyber security incidents continue to hit the headlines. Security and privacy are top concerns for IT and security professionals, especially after 2014’s highly publicized data breaches. Companies around the globe were victim to malware, stolen data and exploited vulnerabilities. Big companies weren’t immune to this, with...
Blog

The Year of The Hack

Image It seems only fitting that 2014 should have ended with the much publicized hacking of Sony as the American public was inundated all year with one sensational account after another of damaging data security breaches. Those surrounding Target, UPS, K-Mart, Staples, Dairy Queen and Home Depot have certainly received the full...