aalimited.com
Technology Risk - Due Diligence Reviews - Information Security
http://www.aalimited.com/partners.html
Providing Security Information Event Management (SIEM) consulting and managed security service provider (MSSP) services. CE is recognized for its capabilities and optimized solutions in secure software development and application penetration testing. Borden Schmidt - Tax and Consulting. Working with and assisting management teams in finding ways to improve profitability in the short term through cost reduction initiatives while meeting or exceeding investors’ growth expectations.
aalimited.net
Technology Risk - Due Diligence Reviews - Information Security
http://www.aalimited.net/partners.html
Providing Security Information Event Management (SIEM) consulting and managed security service provider (MSSP) services. CE is recognized for its capabilities and optimized solutions in secure software development and application penetration testing. Borden Schmidt - Tax and Consulting. Working with and assisting management teams in finding ways to improve profitability in the short term through cost reduction initiatives while meeting or exceeding investors’ growth expectations.
ctech360.com
Technology Risk - Due Diligence Reviews - Information Security
http://www.ctech360.com/partners.html
Providing Security Information Event Management (SIEM) consulting and managed security service provider (MSSP) services. CE is recognized for its capabilities and optimized solutions in secure software development and application penetration testing. Borden Schmidt - Tax and Consulting. Working with and assisting management teams in finding ways to improve profitability in the short term through cost reduction initiatives while meeting or exceeding investors’ growth expectations.
malwarejake.blogspot.com
MalwareJake: May 2016
http://malwarejake.blogspot.com/2016_05_01_archive.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Monday, May 30, 2016. Cyber attacks on. * * toys? For those of you in the USA, enjoy Memorial Day and remember the veterans who are no longer with us because they died securing your freedoms. For those of you everywhere else, happy Monday! But maybe the better question is why are there network connected sex toys in the first place? I would argue ...
malwarejake.blogspot.com
MalwareJake: The JAR did more harm than good
http://malwarejake.blogspot.com/2017/01/the-jar-did-more-harm-than-good.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Wednesday, January 4, 2017. The JAR did more harm than good. The Joint Activity Report (JAR) on GRIZZLY STEPPE. Did far more harm than good. I've had numerous clients of Rendition Infosec. Question me on what the indicators mean and whether they should be concerned. Concerned about Russian hackers in your network? What's an indicator anyway?
malwarejake.blogspot.com
MalwareJake: April 2016
http://malwarejake.blogspot.com/2016_04_01_archive.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Thursday, April 28, 2016. Lessons learned from Hacking Team attacker - Part 2. About HackingTeam's attacker post mortem. Describing the hack. I'll keep part two short and sweet since it's a busy day for me on a forensics case. Nmap scan report for ht-synology.hackingteam.local (192.168.200.66). Address: 192.168.200.66:3260,0. Systems admins used ...
malwarejake.blogspot.com
MalwareJake: January 2017
http://malwarejake.blogspot.com/2017_01_01_archive.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Saturday, January 28, 2017. Cyber attackers cause safety issues. I read a story. The hotel paid a ransom in Bitcoin to restore service. The attackers only asked for 1,500 EUR, but honestly could have probably gotten far more given the seriousness of the mayhem they were causing the hotel. There's some interesting takeaways here. First, if you nee...
malwarejake.blogspot.com
MalwareJake: Putting science in CTI with GRIZZLY STEPPE usage
http://malwarejake.blogspot.com/2017/01/putting-science-in-cti-with-grizzly.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Friday, January 6, 2017. Putting science in CTI with GRIZZLY STEPPE usage. Https:/ www.surveymonkey.com/r/TVK2QR3. Note: Only a member of this blog may post a comment. Subscribe to: Post Comments (Atom). Cyber attackers cause safety issues. Witchcraft as a Service (WaaS). Kaspersky head of computer incident investigations.
malwarejake.blogspot.com
MalwareJake: What should CTI teams be telling leadership?
http://malwarejake.blogspot.com/2017/01/what-should-cti-teams-be-telling.html
Ramblings about security, rants about insecurity, occasional notes about reverse engineering, and of course, musings about malware. What more could you ask for? Monday, January 2, 2017. What should CTI teams be telling leadership? In this post I want to address a problem that many CTI (Cyber Threat Intelligence) teams encounter on a fairly regular basis. CTI teams rarely deliver good news. After all, they are delivering information about cyber threats. Tell them what they want to hear. The Yahoo sale del...
SOCIAL ENGAGEMENT