Examples of non signature based anti-malware/anti-virus programs, IDS, & system integrity scanners

All traditional anti-virus software uses signatures to detect known malware after it has been discovered by the software companies and added to the definitions. Heuristic definitions allow a piece malware that has been modified to still be… Continue reading Examples of non signature based anti-malware/anti-virus programs, IDS, & system integrity scanners

Evading Network-Based Detection Mechanisms – Tradecraft Security Weekly #24

In this episode of Tradecraft Security Weekly hosts Beau Bullock (@dafthack) and Mike Felch (@ustayready) discuss methods for evading network-based detection mechanisms. Many commercial IDS/IPS devices do a pretty decent job of detecting standard pente… Continue reading Evading Network-Based Detection Mechanisms – Tradecraft Security Weekly #24

Tripwire report shows modification dates from when I was on vacation with computer shutdown at home

Tripwire report shows modification dates from when I was on vacation with computer shutdown at home – how is this possible?

here is one of many examples:

Modified object name: /lib/x86_64-linux-gnu/security/pam_systemd.so
Continue reading Tripwire report shows modification dates from when I was on vacation with computer shutdown at home

NextGen SIEM Isn’t SIEM

Security Information and Event Management (SIEM) is feeling its age. Harkening back to a time in which businesses were prepping for the dreaded Y2K and where the cutting edge of security technology was bound to DMZ’s, Bastion Hosts, and network … Continue reading NextGen SIEM Isn’t SIEM