What’s My Exposure? Cybersecurity and Regulatory Requirements for Financial Institutions

Introduction Financial institutions and businesses have been making risk-based decisions in order to protect what’s most important since their inception. The addition of information-systems and applications only serves to extend many of the concepts they are already familiar with, including regulations, risk, assets, intellectual property, vulnerabilities, threats, and threat multipliers. It’s important to understand how [...]

What’s My Exposure? Cybersecurity and Regulatory Requirements for Financial Institutions 2017-08-30T14:49:14+00:00

Sysmon Woes, Elasticsearch and MITRE’s ATT&CK Matrix

This is part 1/4 of a series on Sysmon/Elasticsearch/MITRE's Attack Matrix. We've been working with several customers to deploy a centralized, remote logging server and a custom alerting capability. The goal of this project is to develop and implement alerts that are based on attacker strategies and classes of tactics instead of specific signatures [...]

Sysmon Woes, Elasticsearch and MITRE’s ATT&CK Matrix 2017-08-30T14:49:14+00:00

Signed Java Applet – Water Hole Attack

One of the common attack vectors deals with water hole attacks. These attacks are used to tempt users to click on documents, links, and content that will allow execution onto their box. These can take many forms: Microsoft Office macros (Excel, Word), Flash enabled sites, Javascript attacks, and specifically Java signed applets. We're going to walk [...]

Signed Java Applet – Water Hole Attack 2017-09-14T14:26:23+00:00