(function(i,s,o,g,r,a,m){ i['GoogleAnalyticsObject']=r; i[r]=i[r]||function(){(i[r].q=i[r].q||[]).push(arguments)}, i[r].l=1*new Date(); a=s.createElement(o),m=s.getElementsByTagName(o)[0]; a.async=1; a.data-privacy-src=g; m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-132428928-1', 'auto'); ga('send', 'pageview');

Reports

Forcepoint 2015 Threat Report

2022-06-15T00:55:26-04:00

An excellent publication from Forcepoint that covers CnC malware, malicious insiders and attribution. Unlike other threat reports, this report covers multiple human factors that are often neglected in technical reports. In some cases, human error and predisposition to reuse malware has lead thee researchers to determine a high probability of configuration reuse which leads to easier detection of [...]

Forcepoint 2015 Threat Report2022-06-15T00:55:26-04:00

Why going after wp-config is a quick way to get banned

2022-06-15T00:59:14-04:00

The first is actually more common place. The second assumes the admin that maintains WordPress leaves a backup or older version of the file readable by any visitor that happens to “guess” a filename. In the past, CompSec Direct has been successful employing both techniques for customers during security audits, however the second leaves a 404 [...]

Why going after wp-config is a quick way to get banned2022-06-15T00:59:14-04:00

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica

2022-06-15T01:26:03-04:00

Excellent report by Kaspersky that unmasks a breach inside their corporate infrastructure. Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica2022-06-15T01:26:03-04:00

Pen-testing Guidelines posted from PCI-DSS

2022-06-15T01:24:07-04:00

PCI-DSS recently released a revised document that covers pen-testing requirements for merchants and security providers. The document does a good job of comparing pen-testing with vulnerability assessments. If your company recently had a pen-test or vulnerability assessment done that did not cover all of these area and more, then call us and compare. Here is a [...]

Pen-testing Guidelines posted from PCI-DSS2022-06-15T01:24:07-04:00

IT threat evolution Q2 2014 – Kaspersky

2022-06-15T01:06:41-04:00

Please take time to read this insightful publication by David Emm, Roman Unuchek, Victor Chebyshev, Maria Garnaeva and Denis Makrushin from Kaspersky Labs. The publication offers unparalleled insight and examples of current evolving threats through the info sec lens. Click to Download

IT threat evolution Q2 2014 – Kaspersky2022-06-15T01:06:41-04:00
Go to Top