Don't second guess. Go with experience.

Have you been hit? CyberDefenses can help.

Blog

Categories

Archives

CyberDefenses - Robot

From Cyber Fiction to Cyber Fact

by Dan Cohen Technology follows the imagination. It’s always been that way. The great leaps in tech (civilian, military, or intelligence sectors) are never entirely accidental. Someone somewhere has an idea, and if they’re capable, tries to wrenchit out of the ether to make it a reality. Sometimes they’re lucky enough to ignite a single…

Read More
CyberDefenses - Shield

Strengthening Your Defenses: 5 Tips to Protect Your City from Cyber Threats

The wealth of citizen data municipalities manage daily combined with the critical services that depend on this data makes them attractive targets for cybercrime . If you’re following recent headlines then you’re aware of some cities that have been caught in the cross-hairs of ransomware attacks and the intent behind them range from simple annoyance…

Read More
CyberDefenses - Chess

"Lose Now, Win Later" Principle in Security

By Monty St John Every decision has a distinct set of consequences. Some outcomes can be predicted with particular certainty — others remain dark to any oracular vision. Over time, the effects of a change or shift to security play out. The measured outcomes often become the deciding factors as to whether the original scions…

Read More
CyberDefenses - Python

Credential Dump Collection Automation

by Monty St John In this previous article, it was mentioned at various points that collection should be automated.  After a few emails and slack conversation about it, sharing some approaches to automation seemed in order. Below covers several useful ways to leverage Python to collect from the starting credential sources mentioned in the previous article.…

Read More
CyberDefenses - Dumpster Diving

Credential Dumpster Diving

by Monty St John Credential dumps. Leaked identities. Stuffing lists. Data leaks. The names of the contents change, but the data stays pretty consistent. It is the use, discovery method, and origin of the data that ends up applying the pretty label.   Ever been assigned the task to find out what credentials from your…

Read More
CyberDefenses - Launch

Apprentice Program Launch

Colin Tepfer Director of Education I am pleased to announce the launch of the pilot cohort for the innovative new program from Round Rock, Texas based CyberDefenses, Inc. – the Cybersecurity Apprentice Program™.  Through this exciting new program, we are creating our nation’s next generation of world-class cybersecurity threat hunters. Registered under the US Department…

Read More
CyberDefenses - Banner - Security Analyst

Clearing a View to NIST 800-171 Compliance

By Dave Gray Last year, to help government contractors navigate the uncertainty and complexity around NIST 800-171 compliance, I launched a training and security program with CyberDefenses. It includes monthly online classes and a 500-page System Security Plan (SSP) template, and I’m happy to report that the program is receiving good reviews. The SSP template…

Read More

Escalating Threats, Meet Our Growing Threat Hunting Team

by Damon Fleury  CTO Increased cyber security challenges  With some of the largest scale hacks occurring last year, there has never been a better time to pay attention and re-evaluate your defenses. An estimated 111 billion lines of new software code being created every year, equates to billions of potential vulnerabilities. There are new estimations that cyber-crime damages will cost…

Read More
CyberDefenses - Chrime

CHRIME and Execution

by Monty St John Execution comes last in CHRIME, but it’s far from the end at the same time.  Like I’ve mentioned more than once, it can be the beginning, where the steps of the operation performed are a better starting point.  I’ve highlighted many times that CHRIME is meant to be flipped or even…

Read More
CyberDefenses - Malware Banner

CHRIME and Malware

Malware, the scourge of our existence as cyber threat intelligence.  It’s the last thing we want to detect in our network and a strong part of our enemy’s arsenal.  In fact, commonly when I’m teaching students about malware in our Introduction to Threat Intelligence class, I explain to them that malware is like a firearm. …

Read More

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.