August 18, 2015 | Kate Brew

SANS Incident Response Survey 2015 Infographic

So, you have a security policy, a blue team tasked with protecting your organization and an incident response plan. What happens when the inevitable occurs – you are attacked? SANS just released their 2015 Incident Response survey, summarizing results from 507 survey respondents who shared the top attack types they are seeing, and what is (and it not) working today in terms of…

August 17, 2015 | Garrett Gross

FF-RAT Uses Stealth Tactics to Evade Endpoint Detection

Twice this year (April and June 2015), the United States Office of Personnel Management (OPM) fell victim to a series of targeted attacks that resulted in 21 million current and former Federal government employees’ information being stolen. In the months following the breaches, the FBI’s Cyber Task Force identified several Remote Access Tools (RATs) that were instrumental in the attacks. One…

Get the latest
security news
in your inbox.

Subscribe via email

  RSS  

August 13, 2015 | Larry Moore

What EMV is and what it means for credit card fraud

EMV is an acronym for Europay MasterCard Visa. It is a global payment system that will replace the magnetic stripe (“mag-stripe”) on the back of all debit and credit cards with an embedded microprocessor that will be more difficult to counterfeit and, in most cases, very difficult to extract sensitive payment card information. The mag-stripe that is affixed to current…

August 10, 2015 | Javvad Malik

Black Hat 2015 - Recap

Day 2 of Black Hat started off slowly as many attendees were undoubtedly suffering the ill effects of attending one of the many late-night parties that were held the night before. But with some sleep and sufficient amounts of caffeine, the booth was buzzing again with energy. Open Threat Exchange remained one of the most popular discussion points and Andy Manoske…

August 6, 2015 | Javvad Malik

Black Hat 2015 - AlienVault Booth

As security professionals were getting ready to descend upon Mandalay Bay for Blackhat 2015, we were putting the final touches on our Area 51 themed booth, which featured a UFO abducting a cow. As usual, we were serving our special Cosmic cocktails to keep attendees cool and refreshed as well as unveiling a new design of our infamous green flashing glasses. Aside…

August 3, 2015 | Cheryl Biswas

Stories from the Server Closet -or- When Accidental Tech Happens

My colleague and I had just had a terrific meeting with our contact at TechSoup.  If you aren’t familiar with Tech Soup, they’re a great organization who helps non-profits worldwide obtain discounted, current versions of software, along with hardware and other tech needs.  They got their start redistributing old software to charities in Silicon…

July 30, 2015 | Holly Barker

You Know You’re at Black Hat When Cows Fly!

Black Hat 2015 is just around the corner! Every security practitioner in the world is geeking out already and has their bags packed for one of the biggest InfoSec events of the year. Next week, Las Vegas will be taken by storm with security pros from all over, catching up with old friends, meeting new ones, and attending information filled sessions…

July 28, 2015 | Jaime Blasco

Open Threat Exchange (OTX) - Now Including Social Sharing of Threat Data

The threat landscape is constantly evolving and it is even more of a challenge for organizations, especially those in the mid-market, to detect where the true threats lie without tapping into a broader and often already stretched IT Budget. To help solve this problem, AlienVault developed a free platform called Open Threat Exchange (OTX) to help organizations gain greater visibility…

July 24, 2015 | Garrett Gross

Animal Farm Group - Dino - Smarter than your Average Malware

Did you know that some types of malware are more ‘intelligent’ than others? A recently discovered backdoor Trojan called ‘Dino’ uses some innovative techniques that set itself apart from other malware variants and poses a more significant threat that your ‘typical’ backdoor. Aspects of Dino’s custom file system allow for stealthy command…

July 21, 2015 | Javvad Malik

2015 Gartner Magic Quadrant for SIEM: Visionary Aliens

  AlienVault has been named the only visionary in Gartner’s 2015 magic quadrant for security information and event management (SIEM). As an ex-industry analyst I do not envy the amount of research effort that goes into creating a magic quadrant. There are several challenges which plagued me as an analyst when comparing vendors in a particular segment. One of the first…

July 21, 2015 | Mike Saurbaugh

Cybersecurity Assessment Tool (CAT) from FFIEC

“It’s Reigning CATs…” Scenario comment from the board room…“What’s our risk to external threats, and are we prepared? Better yet, how will we know?” asked a board member. Gone are the days where the board is not intimately involved in cybersecurity assessment and having an understanding as to the organization’s security posture. Like it or not,…

July 16, 2015 | Kenneth Coe

Third Step in Reducing the Cost to Implement a Security Plan

Step 3: Paint with Better Brushes In my previous blogs Step 1 and Step 2 were outlined. Now that we have covered some of the core issues, it is time to flush out the details. The only real way to do this is to read, and not just a little. Information is your friend here. No technology, product, solution, or approach can totally…