Windows Registry & Osquery: The Easy Way to Ensure Users are Secured

Windows Registry & Osquery: The Easy Way to Ensure Users are Secured

The Windows registry is full of information, and with the proper tools, can be a gold mine for attackers and defenders alike. Attackers look to find specific configurations, credentials, or any information ...

One Year Later: Ensuring Windows is Protected from Meltdown+Spectre

2018: The year of speculative execution bugs A year ago, in January 2018, three hardware vulnerabilities known as Meltdown, Spectre Variant 1, and Spectre Variant 2 were disclosed to the public. Although ...
Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Open Source Security Tools and Threat Hunting: The 10 Most Read Bricata Posts on Cybersecurity in 2018

Every week we publish a blog post where we dive into a topic or study around network security. In 2018, we even produced ...
Microsoft’s Johnson: Data Breach Disclosures

New Windows Zero-day Bug Allows Deleting Arbitrary Files

A security researcher released exploit code for an unpatched bug in Windows that could allow an attacker with limited privileges to delete system files. Exploiting the bug requires winning a race condition ...
Security Boulevard

Hunting for Evil Launch Daemons – Identifying Suspicious Behavior with Osquery

| | macos, open source, osquery
Last week, Malwarebytes posted an article highlighting new malware discovered by John Lambert (Microsoft), Patrick Wardle (Objective-See and Digita Security) and Adam Thomas (Malwarebytes), and sure enough, persistence using launchd is still ...
Top Priority in National Cyber Strategy

OSS Security a Top Priority in National Cyber Strategy

The U.S. House of Representatives Committee on Energy and Commerce recently released its Cybersecurity Strategy Report, in which the committee identified several key concepts and principles to address and prevent cybersecurity incidents ...
Security Boulevard

Spring Break without Breaking the Bank: Hands On Training

Over the last eight years, one of the main focuses of Secure Ideas has been education. One responsibility we take very seriously is that of growing the skills within our clients and ...

Combining Threat Detection with Artificial Intelligence, Logz.io Launches Security Analytics App for ELK Stack on its Continuous Operations Platform

 Logz.io Security Analytics Combines Operations and Security into one Simple, Open Source Based Platform for Easier and Faster Mitigation Boston and Tel Aviv, October 24, 2018 — Logz.io, the leader in AI-powered ...
Security Boulevard
The State of Open Source Vulnerabilities Management

The State of Open Source Vulnerabilities Management

| | open source, WhiteSource
The number of open source vulnerabilities hit an all-time record in 2017 with 3,500 reported vulnerabilities – that’s 60% higher than the previous year, and the trend continues in 2018. Since it’s ...
Samurai Sam

SamuraiWTF 4.0 Finally Released

In February of this year, Mic posted a blog discussing the future of SamuraiWTF. (You can go read it here if you don’t remember). As we discussed then, the build process that ...
Loading...