(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

compsec-direct-media

About CompSec Direct

CompSec Direct is a C4ISR firm specialized in CyberSecurity. SDVOSB, QMCS & MBE certified firm of former DOD network operators.

IT threat evolution Q2 2014 – Kaspersky

By |2022-06-15T01:06:41-04:00September 7th, 2014|Categories: Hacking, Reports|Tags: , , , |

Please take time to read this insightful publication by David Emm, Roman Unuchek, Victor Chebyshev, Maria Garnaeva and Denis Makrushin from Kaspersky Labs. The publication offers unparalleled insight and examples of current evolving threats through the info sec lens. Click to Download

Comments Off on IT threat evolution Q2 2014 – Kaspersky

Ransomware going strong, despite takedown of Gameover Zeus – ArsTechnica

By |2022-06-15T01:08:52-04:00September 7th, 2014|Categories: Hacking|Tags: , , , |

Despite numerous public takedowns, cyber criminals will continue to extort users by leveraging their own data as ransom.Click Here for Original Post

Comments Off on Ransomware going strong, despite takedown of Gameover Zeus – ArsTechnica

Advanced Persistent Threat Awareness Study Results 2014 – ISACA

By |2022-06-15T01:02:21-04:00August 29th, 2014|Categories: Hacking|

According to the study by ISACA, 15% of companies are prepared, or feel prepared to handle APT’s. Download Report Here

Comments Off on Advanced Persistent Threat Awareness Study Results 2014 – ISACA

Dark Reading – How to Defend Your Network from Advanced Persistent Threats (APTs)

By |2022-06-15T01:09:53-04:00August 29th, 2014|Categories: Hacking|

Good presentation from Bit9 on using sandboxing to potentially identify APT’s. Click Here

Comments Off on Dark Reading – How to Defend Your Network from Advanced Persistent Threats (APTs)

ArsTechnica – How elite hackers (almost) stole the NASDAQ

By |2022-06-15T01:10:24-04:00July 18th, 2014|Categories: Hacking|Tags: , , |

I recall seeing a NASDAQ trading blackout a few months ago. Although NASDAQ claimed the 4 hour blackout was the result of a high speed trading glitch, it is more probable that these incidents are related given this article. See full article here:  http://arstechnica.com/security/2014/07/how-elite-hackers-almost-stole-the-nasdaq/

Comments Off on ArsTechnica – How elite hackers (almost) stole the NASDAQ

ArsTechnica – Millions of dynamic DNS users suffer after Microsoft seizes No-IP domains

By |2022-06-15T01:05:39-04:00July 2nd, 2014|Categories: Uncategorized|

Microsoft seized over 22 No IP domains under the pretext that they hosted malicious activity. Is this the cost of being in the security business or have they overstepped legal barriers?

Comments Off on ArsTechnica – Millions of dynamic DNS users suffer after Microsoft seizes No-IP domains

ArsTechnica – We don’t need net neutrality; we need competition

By |2022-06-15T01:04:26-04:00June 27th, 2014|Categories: Uncategorized|Tags: , |

Although I may not agree with current policy regarding net neutrality, this op-ed from ArsTechnica conveys an interesting view point that almost persuades one to move away from net neutrality. Unfortunately, the end of net neutrality will mean added costs for sites, email and traffic in general. http://arstechnica.com/tech-policy/2014/06/we-dont-need-net-neutrality-we-need-competition/

Comments Off on ArsTechnica – We don’t need net neutrality; we need competition

DFIR Tournament SANSFIRE 2014

By |2022-06-15T08:45:11-04:00June 26th, 2014|Categories: Uncategorized|Tags: , , |

SANS is hosting a forensics challenge this evening that reinforces the need for improved forensic reflexes. For example, if you normally do the same actions when confronted with a task, this becomes a form of rapid memory reflexes (RMR). If you have to research information in a book or online, you normally apply external memory reflexes [...]

Comments Off on DFIR Tournament SANSFIRE 2014

Verizon 2014 data breach report

By |2022-06-15T01:00:34-04:00June 26th, 2014|Categories: Uncategorized|Tags: , , |

If you are not familiar with this annual report, please take the time and review the findings from Verizon’s in-depth analysis on data breaches. http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf

Comments Off on Verizon 2014 data breach report
Go to Top