blog /
Apr 26, 2018
by
Ray Pompon
You can’t assume that your third-party web apps are secure! You need to assess them yourself using this multi-step process.
report /
Apr 23, 2018
by
David Holmes
Privacy today isn’t just about staying away from prying eyes. The very act of communicating across the Internet with open, non-confidential protocols invites exposure to multiple threat types.
byline /
Apr 19, 2018
by
David Holmes
Fun Fact #2: the author is looking forward to being a card-carrying Singaporean crime fighter (temporarily) someday.
blog /
Apr 17, 2018 (MODIFIED: Apr 26, 2018)
by
Ray Pompon
Savvy CISOs don’t go it alone; they rely on in-house collaborators (outside of the security team) to help achieve the organization’s security objectives.
article /
Apr 12, 2018 (MODIFIED: Apr 25, 2018)
by
Andrey Shalnev
Attackers are targeting a Windows IIS vulnerability first disclosed a year ago to mine Electroneum.
blog /
Apr 10, 2018 (MODIFIED: Apr 26, 2018)
by
Ray Pompon
Critical apps are the ones that must never go down or be hacked. They are also the hardest to defend because they are often massive, ancient, and touch everything.
article /
Apr 06, 2018 (MODIFIED: Apr 23, 2018)
by
Sara Boddy, Ilan Meller, Justin Shattuck, Damien Rocha
The latest DDoS trends include the return of large volumetric DDoS attacks, the rise of application targeted attacks, and businesses in Europe and Asia are growing targets.
byline /
Apr 03, 2018
by
David Holmes
People are mining coins all over the place-all it costs is money for the power bill. So, of course, clever people are figuring out how to use other people’s power to mine cryptocurrency.
article /
Mar 28, 2018 (MODIFIED: Apr 26, 2018)
by
Andrey Shalnev
Apache Struts 2 Jakarta Multipart Parser RCE crypto-mining campaign is now targeting Windows, not just Linux systems.
byline /
Mar 27, 2018
by
David Holmes
With device developers rushing to build IoT as fast as they can, security can suffer.
blog /
Mar 22, 2018 (MODIFIED: Apr 23, 2018)
by
Ray Pompon, Sara Boddy, Debbie Walkowski
Seven steps for improving the security of critical infrastructure systems—and protecting the public from unnecessary risk.
blog /
Mar 20, 2018 (MODIFIED: Apr 23, 2018)
by
Mike Levin, Center for Information Security Awareness
Laptops full of confidential data are still getting stolen, and public Wi-Fi hotspots are being booby-trapped. CISOs need to make users aware of the threat to prevent this from happening.
byline /
Mar 15, 2018 (MODIFIED: Apr 19, 2018)
by
Ray Pompon
A big public breach is a teachable moment for both you and your organization.
report /
Mar 13, 2018 (MODIFIED: Apr 23, 2018)
by
Sara Boddy, Justin Shattuck
IoT attacks show no signs of decreasing while infected IoT devices go un-remediated, and discovery of new thingbots is at a decade-long high.
byline /
Mar 09, 2018 (MODIFIED: Apr 10, 2018)
by
David Holmes
Reaper is just one more blinking light in the faces of the InfoSec community reminding us that we need to get ahead of IOT madness.
article /
Mar 08, 2018 (MODIFIED: Apr 10, 2018)
by
Andrey Shalnev
The same rTorrent XML-RPC function configuration error that was targeted to mine Monero in February was also targeted in January in a campaign apparently spoofing user-agents for RIAA and NYU.
blog /
Mar 02, 2018 (MODIFIED: Apr 12, 2018)
by
Sara Boddy
Memcached is just one of many application infrastructure systems that could launch the same types of attacks if they were also misconfigured.
article /
Feb 28, 2018 (MODIFIED: Apr 17, 2018)
by
Andrey Shalnev
A previously undisclosed misconfiguration vulnerability in the rTorrent client is being exploited in the wild to mine Monero.
byline /
Feb 23, 2018 (MODIFIED: Apr 19, 2018)
by
Preston Hogue
When new technology initiatives are approached in the right way, organizations can implement them, mitigate risk, and provide the best user experience.
blog /
Feb 21, 2018 (MODIFIED: Apr 06, 2018)
by
Andrey Shalnev
The same drop zone server used last week to mine Monero on compromised Jenkins automation servers is now being used in a new Monero mining campaign targeting Oracle Web Logic servers.
blog /
Feb 15, 2018 (MODIFIED: Mar 30, 2018)
by
Travis Kreikemeier
As the black-market price for stolen data declines, attackers turn to cryptojacking schemes to maximize their profits—all at your expense.
byline /
Feb 13, 2018 (MODIFIED: Mar 30, 2018)
by
Preston Hogue
Risk transfer strategies allow you more time to focus on your business.
blog /
Feb 08, 2018 (MODIFIED: Mar 22, 2018)
by
Debbie Walkowski, David Holmes
Real estate scams are big business for attackers. Be on the lookout for this one, which can leave home buyers destitute if not caught in time.
blog /
Feb 06, 2018 (MODIFIED: Mar 20, 2018)
by
Ray Pompon
As security expertise becomes more scarce, CISOs are turning to machine learning to do more with fewer people.
blog /
Jan 31, 2018 (MODIFIED: Apr 16, 2018)
by
Sara Boddy
Critical lessons can be learned from others’ mistakes. Don’t learn the hard way; heed the warnings from our research.
blog /
Jan 25, 2018 (MODIFIED: Mar 09, 2018)
by
Debbie Walkowski
F5 Labs covered a multitude of threats, vulnerabilities, botnets, attackers, and attacks in 2017. Here are just some of the highlights you might have missed.
blog /
Jan 24, 2018 (MODIFIED: Mar 02, 2018)
by
Ray Pompon
If you’re not evaluating risk in terms of likelihood and impact, you could be focusing your security efforts in all the wrong places.
blog /
Jan 18, 2018 (MODIFIED: Mar 15, 2018)
by
Jared B. Reimer
Accept that breaches are inevitable in today’s world, then take these steps to reduce the chances of a large-scale, headline-making compromise.
blog /
Jan 16, 2018 (MODIFIED: Feb 21, 2018)
by
Lori MacVittie
Forty-three percent of organizations say security is essential when deploying apps, and more than two thirds use multiple security solutions to protect clients, infrastructure, and web apps.
article /
Jan 15, 2018 (MODIFIED: Mar 02, 2018)
by
Doron Voolf
Ramnit’s latest twist includes targeting the most widely used web services during the holidays: online retailers, entertainment, banking, food delivery, and shipping sites.
byline /
Jan 12, 2018 (MODIFIED: Feb 23, 2018)
by
Preston Hogue
Performing a risk analysis and taking due care are no longer optional.
blog /
Jan 10, 2018 (MODIFIED: Mar 01, 2018)
by
Lori MacVittie
Every week another bug, vulnerability, or exploit is released - we need a multi-layered security strategy (beyond our standard patch “spin cycles”) to deal with threats like Spectre and Meltdown.
blog /
Jan 09, 2018 (MODIFIED: Feb 13, 2018)
by
Ray Pompon
How moving application into the cloud can make your organization stronger and more valuable to your customers.
blog /
Jan 04, 2018 (MODIFIED: Feb 21, 2018)
by
David Holmes
With Mirai rearing its ugly head again, we’re revealing its C&C hostnames so organizations can update their blacklists and protect themselves.
article /
Jan 03, 2018 (MODIFIED: Mar 08, 2018)
by
Maxim Zavodchik, Liron Segal, Aaron Brailsford
A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.
blog /
Jan 02, 2018 (MODIFIED: Feb 09, 2018)
by
Ray Pompon, Sara Boddy
The safest way to run a network is to assume it’s going to breached, but that also means minimizing your liability and ensuring the executive team is fully aware of what is going on.
blog /
Dec 28, 2017 (MODIFIED: Jan 23, 2018)
by
Justin Shattuck
Most security researchers have good intentions, but ethics must play a central role in the decisions they make.
blog /
Dec 27, 2017 (MODIFIED: Jan 15, 2018)
by
David Holmes
Bleichenbacher attacks will likely continue to pop up until TLS 1.3 is fully adopted, which could take years.
blog /
Dec 26, 2017 (MODIFIED: Jan 24, 2018)
by
Ravila White
In Part 5 of this blog series, we use inversion modeling techniques to develop a high-level protection strategy.
byline /
Dec 19, 2017 (MODIFIED: Jan 18, 2018)
by
Preston Hogue
Security teams can fulfill the CISOs responsibilities and help business groups become more security-savvy by working through the due diligence and due care process together.