Jack White, best known as the lead singer and guitarist of The White Stripes, has a simple philosophy: “Ya gotta fight it!” I saw a documentary including White recently. In one segment, he purchases a half-dead Tiesco guitar from Goodwill,… Read More
In today’s #BENVLOG, Chief Security Strategist Ben Johnson discusses the importance of event relationships as well as how critical building actual, human relationships are when building your information security program.
By Russell Nolen and Mike Sconzo The recent vulnerability of MS15-093 revealed that attackers were using it distribute the Korplug/Plugx RAT. After obtaining a sample from this attack and conducting further analysis, we found that the attackers have been using… Read More
While working the SOC at DEF CON this year, some of the other analysts wanted to learn a bit more about manual threat hunting. Their request was tool agnostic so I did my best to adapt to those who use… Read More
We were recently asked by a customer how to block PowerShell from launching via macros embedded in MS Office files (xlx, doc, ppt, etc.). I did some research and found a handy tool for creating a bad Excel document that… Read More
I recently saw Dave Grohl talking about how great bands are born and how the state of reality TV has really messed things up. He said that kids today think you karaoke-karaoke-karaoke, then you stand in line at the pavilion… Read More