Addressing Identity Risk Factors

By Tim Norris Mobile and Cloud have raised the stakes for security in general and for identity-related security challenges in particular. But while identity-related risk has grown tremendously, in many ways, the risks themselves are ones we’ve long recognized – such as orphaned accounts, segregation of duties (SoD) violations and privileges following users to new…

The post Addressing Identity Risk Factors appeared first on Speaking of Security – The RSA Blog.

Continue reading Addressing Identity Risk Factors

DEMAND MORE FROM YOUR SIEM

By Mike Adler, VP Product, NetWitness Suite If you’re like a lot of IT security professionals, you’ve always been able to rely on your SIEM to provide log data for threat detection. But that’s just not enough to keep up with all the new threats from new sources that are bombarding organizations today. Can your…

The post DEMAND MORE FROM YOUR SIEM appeared first on Speaking of Security – The RSA Blog.

Continue reading DEMAND MORE FROM YOUR SIEM

The Myth of the Easy Button Approach to Information Security

By: Wes Riley and Erik Heuser In twenty plus years navigating the complexities of the information security (InfoSec) industry a common theme emerges: the fascination with creating the digital panacea, or Easy Button. Marketing departments highlight their product in the best light possible and tell you it will solve all your InfoSec headaches. Years of…

The post The Myth of the Easy Button Approach to Information Security appeared first on Speaking of Security – The RSA Blog.

Continue reading The Myth of the Easy Button Approach to Information Security

Shadowfall

Over the last several months, RSA Research embarked on a cross-organizational effort against RIG Exploit Kit (RIG EK or just plain RIG), which led to insight into the operational infrastructure (and possibly the entire ecosystem), as well as significant discoveries related to domain shadowing. Domain shadowing is “a technique in which attackers steal domain account…

The post Shadowfall appeared first on Speaking of Security – The RSA Blog.

Continue reading Shadowfall

SuperCMD RAT

On April 8th, an interesting DLL was uploaded from Canada to VirusTotal. What makes it interesting is that the detections on VirusTotal are mostly heuristics and do not settle on a single family. The malware is also configured to beacon to an RFC1918 internal IP address, however, the name 816db8a1916201309d2a24b4a745305b.virus indicates it was picked up…

The post SuperCMD RAT appeared first on Speaking of Security – The RSA Blog.

Continue reading SuperCMD RAT

A Different Take on Keystroke Logging

On March 29th a file was uploaded to VirusTotal containing a fake Microsoft Update Authenticode certificate. Soon thereafter, RSA Research investigated the sample based on certain artifacts that matched those present on Shell_Crew malware RSA Research previously reported on. This Windows DLL file was compiled on October 28th, 2014 at 06:35:47 GMT (Table 1). Table…

The post A Different Take on Keystroke Logging appeared first on Speaking of Security – The RSA Blog.

Continue reading A Different Take on Keystroke Logging

Major Events and Hacktivism #OpOlympicHacking

Introduction As anyone who tracks attacks on the internet can tell you, Activists using hacking activity, aka “Hacktivists”, have discovered that a relatively basic hacking approach, with buy-in from disenfranchised groups of people, can have significant effects on online businesses. With names like #OpISIS, #OpParis, #OpMonsanto, #OpWhales, #OpKillingBay, #OpKKK, and #OpTrump, you can easily see…

The post Major Events and Hacktivism #OpOlympicHacking appeared first on Speaking of Security – The RSA Blog and Podcast.

Continue reading Major Events and Hacktivism #OpOlympicHacking