Don't second guess. Go with experience.

Have you been hit? CyberDefenses can help.

Blog

Categories

Archives

Are You an Interesting Target?

Are you an interesting target?  In the rack and stack of threat intelligence, the tactics used by an adversary are illuminating.  It’s easier to flip the toggle and switch in and out atomic indicators than to flip over the way you do business.  It’s a matter of investment.  That domain?  Pffftt.  No problem.  The method…

Read More

Are you NIST 800-171 ready? The clock is ticking…

If you are a U.S. federal government contractor (or anyone else who touches CUI), you’re probably aware of NIST SP 800-171.  If not, you certainty should be – and fast.  One of our newest services is a program that helps contractors understand the requirements in detail, assess where you stand relative to compliance, and then…

Read More

Rats in the walls (and in your network)

  Ever had an inspector tell you that you have rats in your walls? Given, it’s not likely to be something you’ll want to widely admit, but it happens–no matter how clean, how affluent, or how prestigious you might be. All it takes is the confluence of the right factors. Just add kids, left over…

Read More

Petya 2017: Are we looking at ransomware or cyber attack?

By Monty St. John & Chris Rogers The attack began small, but rapidly got everyone’s attention.  It didn’t take long in the first hours of Tuesday’s attack for it to become pretty clear that Ukraine was the epicenter of the strike.  In fact, more than half of the reports of new “Petya” malware were located…

Read More

Wannacry – Can We Really Call It a New Thing?

  Plenty out there spoken about Wanna Cry, including on this blog (post and post). At its heart, it’s less ransomware than a worm exploiting a Windows OS vulnerability that looks to the network to infect even more computers. In fact, it was overwhelmingly successful, much more so as a worm than anything remotely as…

Read More

Building Targets with CRITs

In a previous post (located here) we chatted about CRITs and using targets.  While this was in relation to phishing, it doesn’t need to be.  The Targets collection is really flexible, although I’ll freely admit you’ll need to massage it slightly.  The original direction in CRITs development was to view a target an an individual…

Read More

CRITs – The Fulcrum for the Lever of Intel

As a services company, it’s probably no surprise that we help people.  When companies need a hand or need to add in a capability that they previously didn’t have, we get a chance to get involved in some exciting situations.  Sometimes exciting bad, like when an incident occurs, but just as often exciting good, when…

Read More

Phishing with CRITs

CRITs was introduced a bit earlier as a threat intelligence platform (TIP) worth your time to review, if not employ in your enterprise.  Let me show a quick example why. Raise your hands – who has to deal with phishing? Okay.  I couldn’t see who raised their hands, but given its ubiquity within everyone’s enterprise,…

Read More

Making CRITical Introductions

CRITical introduction–A play on words, to be sure.  Collaborative Research in Threats, or CRITs for short, is a threat intelligence platform (TIP).  It’s the repository where you store threat data and those sometimes fragile connections that you make to link everything together.  Don’t just take my word for it–here’s a fragment of  the introduction straight from their…

Read More

Negative space and filling gaps in YARA

Using negative space and inverse matching is a lesser-seen but excellent technique to type and classify files. Here the point is not to look for what is there, but to look for what isn’t there — when it should be. Besides an excellent presentation technique it’s also a method borrowed from threat intelligence (TI). One…

Read More

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.