What To Look For In Logs: Hackers Being Successful
Today there was an interesting VISA BlackPOS informational webinar today. What I got out of it is some more information to make sure and keep in mind these items when…
If Offense Has Advantage We Must Analyze Logs Better
If the theory says that Offense will always find a way into your environment (somehow) with a mistake or just better attacks then we must get better at developing Logs…
Zero-Day Attacks And Why Patching Means Catching Up
Another day another Zero-Day Attack: From Sucuri Blog¹ which found a remote Code Execution attack on Joomla a CMS(Content Management System) software The hackers are interested in these all the…
How Do You Improve Cybersecurity? Will Not Be Easy!
As we get ready for 2016 From the www.timessquarenyc.org/events/new-years-eve/sponsor-new-years-eve website (with additional Text “2016”). It will look similar to the image above – maybe a different font for the numbers.…
Avoiding Detection – Obfuscation the Criminal Game
Reading the Oversitesentry 30 Security Analysis posts I was struck by the recurring theme of detection avoidance and obfuscation is the name of the criminal game. Specifically: Rapid7’s Blog post¹…
