Reports

Home/Reports

Case 1

By |2019-10-16T12:11:09-05:00August 27th, 2019|Categories: Attribution, Breach, Case Study, Contracts, Cyber, Defensive Methodology, Disclosure, Forensic, Hacking, Hunting, Incident Response, Laws, Reports|Tags: |

Case 1. If you like the case study, hit us up and let us know. Take care. Malware Analysis on Hybrid-Analysis. case1Download

Comments Off on Case 1

Judicial branch of Puerto Rico exposes sensitive court documents

By |2019-08-15T13:19:40-05:00May 31st, 2017|Categories: Hacking, Laws, Reports|Tags: , , , , , |

Problem CompSec Direct recently became aware of an information disclosure problem with the https://unired.ramajudicial.pr/lawyernotificationauthentication/ application used by the judicial branch of the Puerto Rico government. The application uses a weak sequential ID string that is provided to attorneys and clients in order to view sensitive legal documents. Manipulating the ID string with simple math, similar to [...]

Comments Off on Judicial branch of Puerto Rico exposes sensitive court documents

CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor

By |2019-08-15T13:19:40-05:00April 30th, 2017|Categories: Cyber, Demo, Laws, Reports|Tags: , , , , , , |

Our President, Jose Fernandez, presented ZigBee research at Bsides Charm 2017 in Baltimore on April 29, 2017. The presentation, called Frony Fronius: Exploring ZigBee signals from SolarCity covered IoT (Internet of Threats) findings on commercial solar panel solutions. Part of the presentation asked participants how they felt about e-meters and how companies are beginning to deploy [...]

Comments Off on CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor

CompSec Direct receives media mentions as the result from incident response services offered to Hacienda of Puerto Rico

By |2019-08-15T13:19:41-05:00March 18th, 2017|Categories: Attribution, Contracts, Cyber, Defensive Methodology, Hunting, Incident Response, Reports|Tags: , , , , |

The Center of Investigative News (Centro de Periodismo Investigativo) published an excellent summary of events from the situation the department of Hacienda faced in early March of 2017. Our early involvement in this event helped the citizens of Puerto Rico during an already difficult economic situation. We will continue to work with the department of Hacienda [...]

Comments Off on CompSec Direct receives media mentions as the result from incident response services offered to Hacienda of Puerto Rico

CompSec Direct solicited for subject matter expertise on Incident Response for Hacienda of Puerto Rico

By |2019-08-15T13:19:41-05:00March 10th, 2017|Categories: Attribution, Contracts, Defensive Methodology, Hunting, Incident Response, Reports|Tags: , , , |

CompSec Direct was asked to provide incident response services to the department of Hacienda, the Treasury department of Puerto Rico, on March 7,2017. The department of Hacienda was experiencing daily losses of approximately $20 million dollars a day due to the severity and impact of ransomware on the government network. CompSec Direct's president, Jose Fernandez, led [...]

Comments Off on CompSec Direct solicited for subject matter expertise on Incident Response for Hacienda of Puerto Rico

NTT Group Global Threat Intelligence Report 2016

By |2019-08-15T13:19:41-05:00October 19th, 2016|Categories: Cyber, Defensive Methodology, Forensic, Reports|Tags: , , , |

GTIR 2016 NTT Group published a great threat report for 2016. Quality publication and definitely worth while. Good for CISO's and Info Sec pros alike. Although some of the areas in the Key Findings are questionable given that we recently saw DDoS attacks above 1Tbs , other areas highlight recent trends that ultimately affect all of [...]

Comments Off on NTT Group Global Threat Intelligence Report 2016

Forcepoint 2015 Threat Report

By |2019-08-15T13:19:42-05:00February 15th, 2016|Categories: Attribution, Cyber, Defensive Methodology, Forensic, Hacking, Hunting, Pen-testing, Reports, Tor|

An excellent publication from Forcepoint that covers CnC malware, malicious insiders and attribution. Unlike other threat reports, this report covers multiple human factors that are often neglected in technical reports. In some cases, human error and predisposition to reuse malware has lead thee researchers to determine a high probability of configuration reuse which leads to easier [...]

Comments Off on Forcepoint 2015 Threat Report

Why going after wp-config is a quick way to get banned

By |2019-08-15T13:19:42-05:00January 15th, 2016|Categories: Attribution, Defensive Methodology, Hacking, Reports, Wordpress|

Internet sites with Wordpress are normally exploited with ease in two ways: 1. Vulnerable plugins or a vulnerability in Wordpress. 2. Reading backup's of the wp-config.php file. The first is actually more common place. The second assumes the admin that maintains Wordpress leaves a backup or older version of the file readable by any visitor that [...]

Comments Off on Why going after wp-config is a quick way to get banned

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica

By |2019-08-15T13:19:42-05:00June 13th, 2015|Categories: Breach, Hacking, Reports|Tags: , |

Excellent report by Kaspersky that unmasks a breach inside their corporate infrastructure. Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks

Comments Off on Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica

Pen-testing Guidelines posted from PCI-DSS

By |2017-05-30T21:01:16-05:00April 4th, 2015|Categories: Pen-testing, Reports|Tags: , , , |

PCI-DSS recently released a revised document that covers pen-testing requirements for merchants and security providers. The document does a good job of comparing pen-testing with vulnerability assessments. If your company recently had a pen-test or vulnerability assessment done that did not cover all of these area and more, then call us and compare. Here is a [...]

Comments Off on Pen-testing Guidelines posted from PCI-DSS