Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Introduction One of most significant recent developments in sophisticated offensive operations is the use of “Living off the Land” (LotL) techniques by attackers. These techniques leverage legitimate tools present on the system, ...
A Totally Tubular Treatise on TRITON and TriStation

A Totally Tubular Treatise on TRITON and TriStation

Introduction In December 2017, FireEye's Mandiant discussed an incident response involving the TRITON framework. The TRITON attack and many of the publicly discussed ICS intrusions involved routine techniques where the threat actors ...
Reverse Engineering the Analyst: Building Machine Learning Models for
the SOC

Reverse Engineering the Analyst: Building Machine Learning Models for the SOC

Many cyber incidents can be traced back to an original alert that was either missed or ignored by the Security Operations Center (SOC) or Incident Response (IR) team. While most analysts and ...
Fighting malware with machine learning | Avast

Fighting malware with machine learning | Avast

Introduction As one of the leading companies in computer security, we work hard every day to bring the highest level of protection to all of our users. This requires us to constantly ...
Remote Authentication GeoFeasibility Tool - GeoLogonalyzer

Remote Authentication GeoFeasibility Tool – GeoLogonalyzer

Users have long needed to access important resources such as virtual private networks (VPNs), web applications, and mail servers from anywhere in the world at any time. While the ability to access ...

Spectre continues: Did we all trade speed for security? | Avast

| | Threat Research
For anyone in the cybersecurity industry, 2018 began on January 3rd — the day a trio of CPU bugs was announced. What trio? You probably recall Meltdown and Spectre, but from our ...
Shining a Light on OAuth Abuse with PwnAuth

Shining a Light on OAuth Abuse with PwnAuth

Introduction Spear phishing attacks are seen as one of the biggest cyber threats to an organization. It only takes one employee to enter their credentials or run some malware for an entire ...
Hacking iLO — take a moment to secure your servers | Avast

Hacking iLO — take a moment to secure your servers | Avast

This is a call to action! Please see my experiment below — and agree with my assertion that as a global digital culture, we must care more about security. Starting now ...
A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan

A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan

As discussed in previous blogs, exploit kit activity has been on the decline since the latter half of 2016. However, we do still periodically observe significant developments in this space, and we ...
Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World

Rooting a Logitech Harmony Hub: Improving Security in Today’s IoT World

Introduction FireEye’s Mandiant Red Team recently discovered vulnerabilities present on the Logitech Harmony Hub Internet of Things (IoT) device that could potentially be exploited, resulting in root access to the device via ...
Loading...