Author Archives: Rico Valdez

All posts written by Rico Valdez

Tech Tuesday: Carbon Black Integration with iSIGHT Partners for Enhanced Detection & Response

By: July 28, 2015

Carbon Black is the industry’s leading endpoint threat detection and response solution. To enhance Carbon Black’s detection and response capabilities, Carbon Black pulls in threat intelligence from the Bit9 + Carbon Black Threat Intelligence Cloud, which offers comprehensive advanced threat… Read More

Using Bit9 to Mitigate MS15-078/CVE-2015-2426

By: July 24, 2015

As the fallout from The Hacking Team compromise continues, another zero-day in their possession has come to light. This one consists of a kernel vulnerability that not only provides privilege escalation, but also remote code execution. It’s serious enough that… Read More

Using Bit9 + CB to Counter Microsoft OLE 0-day

By: October 22, 2014

The latest Microsoft vulnerability is out, unpatched and currently being leveraged in targeted attacks. While we anxiously await an official patch, Bit9 + Carbon Black customers can detect, prevent and remediate attacks exploiting this vulnerability today. Yesterday, Microsoft released a… Read More

Bit9 + Carbon Black Update on the Bash Bug “Shell Shock”

By: September 30, 2014
Bash Bug Shell Shock

September 30, 2014 Update:  “We wanted to give an update on this issue. It appears that Florian Weimer has written a patch that effectively closes the hole found in Bash, as well as those that remained after the initial patch (and… Read More

Bit9 Blocks Recent IE 0-Day

By: May 2, 2014

Earlier this week, Microsoft announced another 0-day vulnerability in Internet Explorer that was being exploited in targeted attacks. As expected, this set off a scramble for answers to many questions, the most relevant being: “How can I defend against this… Read More

2 Million Passwords Stolen… Is Anyone Surprised?

By: December 13, 2013
Password Banner image for blog

Trustwave’s SpiderLabs blogged last week about running across a cache of nearly 2 million stolen credentials. What makes this a little different than other large password caches recently discovered is the fact that the credentials found were not associated with a single website. Unlike the account leaks reported by Adobe, LinkedIn, Twitter, etc. (I could continue far longer than I’d like), these credentials were gathered not by the compromise of a single website or database, but from the end-user systems themselves. Continue reading