Kingslayer – A Supply Chain Attack

Today, RSA is publishing new research on a sophisticated software supply-chain attack – dubbed “Kingslayer”. RSA Research investigated the source of suspicious, observed beaconing thought to be associated with targeted malware. In the course of their investigation, RSA discovered a sophisticated software supply-chain attack involving a Trojan inserted in otherwise legitimate software; software that is…

The post Kingslayer – A Supply Chain Attack appeared first on Speaking of Security – The RSA Blog.

Continue reading Kingslayer – A Supply Chain Attack

Schoolbell: Class is in Session

by Kent Backman and Kevin Stear, RSA Research Backstory If a sophisticated exploitation campaign is broad enough, it will attract the attention of multiple threat researchers. Such is the case of the malicious, multi-faceted exploitation campaign and botnet RSA Research has dubbed “Schoolbell.” In this blog, RSA will build on existing industry research and dig…

The post Schoolbell: Class is in Session appeared first on Speaking of Security – The RSA Blog.

Continue reading Schoolbell: Class is in Session

Schoolbell: Class is in Session

by Kent Backman and Kevin Stear, RSA Research Backstory If a sophisticated exploitation campaign is broad enough, it will attract the attention of multiple threat researchers. Such is the case of the malicious, multi-faceted exploitation campaign and botnet RSA Research has dubbed “Schoolbell.” In this blog, RSA will build on existing industry research and dig…

The post Schoolbell: Class is in Session appeared first on Speaking of Security – The RSA Blog.

Continue reading Schoolbell: Class is in Session

Launching the Security Operations Center (SOC) at RSA Conference

              Welcome to RSA Conference 2017! The RSA Conference SOC team set up the Security Operations Center over the weekend. We were here along with scores of construction crews re building huge booth displays for some of the largest security companies in the world. It was a long weekend…

The post Launching the Security Operations Center (SOC) at RSA Conference appeared first on Speaking of Security – The RSA Blog.

Continue reading Launching the Security Operations Center (SOC) at RSA Conference

Act at the Speed of Fraud: Take the Challenge

How fast can you find fraud?  That is the challenge put forth by the RSA Fraud & Risk Intelligence team at RSA Conference 2017. Why the emphasis on speed? Simply put, the faster an organization can isolate the source of fraud, the faster they can respond. And based on RSA’s research, there is a gaping…

The post Act at the Speed of Fraud: Take the Challenge appeared first on Speaking of Security – The RSA Blog.

Continue reading Act at the Speed of Fraud: Take the Challenge

Ham Radio Trips Circuit Breakers

Arc-fault circuit breakers are a boon for household electrical safety. The garden-variety home electrical fire is usually started by the heat coming from a faulty wire arcing over. But as any radio enthusiast knows, sparks also give off broadband radio noise. Arc-fault circuit interrupters (AFCI) are special circuit breakers that listen for this noise in the power line and trip when they hear it. The problem is that they can be so sensitive that they cut out needlessly. Check out the amusing video below the break.

Our friend [Martin] moved into a new house, and discovered that he could flip …read more

Continue reading Ham Radio Trips Circuit Breakers

Are Software Supply Chain Attacks the New Norm?

How many of us stop to think about updating software we use every day? Do you think “maybe I should check for threats on this before I install it?” Or do you wait for it to automatically update? For many of us, we don’t consider the security of the everyday software we use. This is…

The post Are Software Supply Chain Attacks the New Norm? appeared first on Speaking of Security – The RSA Blog.

Continue reading Are Software Supply Chain Attacks the New Norm?

Are Software Supply Chain Attacks the New Norm?

How many of us stop to think about updating software we use every day? Do you think “maybe I should check for threats on this before I install it?” Or do you wait for it to automatically update? For many of us, we don’t consider the security of the everyday software we use. This is…

The post Are Software Supply Chain Attacks the New Norm? appeared first on Speaking of Security – The RSA Blog.

Continue reading Are Software Supply Chain Attacks the New Norm?

Super Bowl “Digital Deflategate” is Not Just Air

When we think of large entertainment venues and events, it’s not just ticket fees and concessions anymore. Sporting is entertainment and this year’s Super Bowl LI (51) is one of the most complex, technologically orchestrated events in the world; ranging from tablet-based play books to RFID wearable sensors on players sending real time performance data…

The post Super Bowl “Digital Deflategate” is Not Just Air appeared first on Speaking of Security – The RSA Blog.

Continue reading Super Bowl “Digital Deflategate” is Not Just Air

LiftLocker Keeps Your Lift Safe from Attacking Garage Doors

Car lifts used to be a tool reserved for professional mechanics. Times are a-changing though. With the advent of reasonably priced four-post hydraulic lifts, more and more shade tree mechanics are joining the five-foot high club. Installing a lift in a home garage creates a few hazards, though. What happens when a family remotely opens the garage door while there is a car up on the lift? Garage door and lifted vehicle will meet – with expensive and/or dangerous results. [Joe Auman] saw this problem coming a mile away. He built the LiftLocker to make sure it never happens to …read more

Continue reading LiftLocker Keeps Your Lift Safe from Attacking Garage Doors