Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program

You may recall my previous blog post about how our X-Force veteran threat hunter Neil Wyler (a.k.a “Grifter”) discovered nation-state attackers exfiltrating unencrypted, personally identifiable information (PII) from a company’s network, unbeknownst to the security team. The post highlighted why threat hunting should be a baseline activity in any environment. Before you can embark on […]

The post Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program appeared first on Security Intelligence.

Continue reading Black Hat 2022 Sneak Peek: How to Build a Threat Hunting Program

Electron Application Attacks: No Vulnerability Required

While you may have never heard of “Electron applications,” you most likely use them. Electron technology is in many of today’s most popular applications, from streaming music to messaging to video conferencing applications. Under the hood, Electron is essentially a Google Chrome window, which developers can modify to look however they prefer. Since Chrome is […]

The post Electron Application Attacks: No Vulnerability Required appeared first on Security Intelligence.

Continue reading Electron Application Attacks: No Vulnerability Required

The Best Threat Hunters Are Human

“You won’t know you have a problem unless you go and look.” Neil Wyler, who is known as ‘Grifter’ in the hacker community, made that statement as a precursor to an unforgettable story. An organization hired Grifter to perform active threat hunting. In a nutshell, active threat hunting entails looking for an attacker inside an […]

The post The Best Threat Hunters Are Human appeared first on Security Intelligence.

Continue reading The Best Threat Hunters Are Human

A New Cybersecurity Executive Order Puts the Heat on Critical Infrastructure Suppliers

Ransomware. Five years ago, the cybersecurity community knew that term well, although among others it was far from dinner table conversation. Times have changed. Since early 2020, ransomware has hit a slew of headlines. People inside and outside of the security industry are talking about it, and many have experienced the ransomware pain firsthand. The […]

The post A New Cybersecurity Executive Order Puts the Heat on Critical Infrastructure Suppliers appeared first on Security Intelligence.

Continue reading A New Cybersecurity Executive Order Puts the Heat on Critical Infrastructure Suppliers

An Attack Against Time

When Liza Minnelli sang that famous tune, “Money makes the world go around,” she should have added one more word: time. Time makes the world go around. It’s that one agreed-upon part of life that the world shares. From laptops to phones to wall clocks to just about every other technology, time is everywhere, controlling […]

The post An Attack Against Time appeared first on Security Intelligence.

Continue reading An Attack Against Time

Red & Blue: United We Stand

Offensive and defensive security are typically viewed as opposite sides of the same fence. On one side, the offensive team aims to prevent attackers from compromising an organization, whereas on the other side the defensive team aims to stop attackers once they are inside. The fence, metaphorically speaking, is the adversary. The adversary’s moves, motives […]

The post Red & Blue: United We Stand appeared first on Security Intelligence.

Continue reading Red & Blue: United We Stand

Your Home Away From Home May Not Be as Cybersecure as You Think

Home is where the ‘smart’ is. A recent study revealed the average American household has 25 connected or Internet of Things (IoT) devices. The number of consumers who have smart home devices connected to their home internet has grown by 38% since the pandemic began. The findings don’t surprise Brad Ree, the chief technology officer […]

The post Your Home Away From Home May Not Be as Cybersecure as You Think appeared first on Security Intelligence.

Continue reading Your Home Away From Home May Not Be as Cybersecure as You Think

Expert Interview: How to Secure Critical Infrastructure With Operational Technology

In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities in critical infrastructure such as ICS and the operational technologies (OT) that run them have made frequent headlines. From public water system threats to research […]

The post Expert Interview: How to Secure Critical Infrastructure With Operational Technology appeared first on Security Intelligence.

Continue reading Expert Interview: How to Secure Critical Infrastructure With Operational Technology

Expert Interview: How to Secure Critical Infrastructure With Operational Technology

In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities in critical infrastructure such as ICS and the operational technologies (OT) that run them have made frequent headlines. From public water system threats to research […]

The post Expert Interview: How to Secure Critical Infrastructure With Operational Technology appeared first on Security Intelligence.

Continue reading Expert Interview: How to Secure Critical Infrastructure With Operational Technology

Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach

“It has gotten to the point, unfortunately, where they are so frequent and common these days, that it’s like, here we go again,” Christopher Sitter says when I asked him about the prospect of a third-party data breach. Sitter is the senior director of information security at Juniper Networks. He manages all things incident response-related — […]

The post Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach appeared first on Security Intelligence.

Continue reading Wake Me Up Before You Know Know … About the Latest Third-Party Data Breach