They’re Watching You! Protecting Yourself From Hidden Cameras

Hidden cameras, spy cameras, nanny cams—whatever you call them, you are under surveillance much more than you may realize. While outdoor perimeter cameras and doorbell cameras are commonplace and have been used for quite some time to monitor property, other nefarious hidden cameras are popping up all over the place. Generally, any camera placed inside…

The post They’re Watching You! Protecting Yourself From Hidden Cameras appeared first on TrustedSec.

Continue reading They’re Watching You! Protecting Yourself From Hidden Cameras

Who Left the Backdoor Open? Using Startupinfo for the Win

In the endless quest to research additional Windows system forensic artifacts to use during an Incident Response investigation, I stumbled across something I thought was cool. This definitely wasn’t a new artifact, it was just a specific native Windows XML file that I wasn’t aware of. I noticed this file was not commonly used from…

The post Who Left the Backdoor Open? Using Startupinfo for the Win appeared first on TrustedSec.

Continue reading Who Left the Backdoor Open? Using Startupinfo for the Win

SolarWinds Backdoor (Sunburst) Incident Response Playbook

Over the last several days, TrustedSec has received queries on the best ways to contain, eradicate, and remediate the SolarWinds backdoor (aka #solarigate aka Sunburst). The TrustedSec Incident Response team has put together a playbook of recommended actions to provide some level of assurance that your organization is no longer affected by the backdoor. This…

The post SolarWinds Backdoor (Sunburst) Incident Response Playbook appeared first on TrustedSec.

Continue reading SolarWinds Backdoor (Sunburst) Incident Response Playbook