What Jack White and The White Stripes Taught Me about Using the Right ‘Instruments’

By: September 9, 2015

Jack White, best known as the lead singer and guitarist of The White Stripes, has a simple philosophy: “Ya gotta fight it!” I saw a documentary including White recently. In one segment, he purchases a half-dead Tiesco guitar from Goodwill,… Read More

#BENVLOG: Nurturing Human Relationships to Strengthen Security Posture

By: September 8, 2015

In today’s #BENVLOG, Chief Security Strategist Ben Johnson discusses the importance of event relationships as well as how critical building actual, human relationships are when building your information security program.

Threat Research Team Goes “Beyond the Exploit” in Search of Payloads from MS15-093

By: September 4, 2015

By Russell Nolen and Mike Sconzo The recent vulnerability of MS15-093 revealed that attackers were using it distribute the Korplug/Plugx RAT. After obtaining a sample from this attack and conducting further analysis, we found that the attackers have been using… Read More

Threat Hunting with Carbon Black

By: September 1, 2015

While working the SOC at DEF CON this year, some of the other analysts wanted to learn a bit more about manual threat hunting. Their request was tool agnostic so I did my best to adapt to those who use… Read More

Block PowerShell from Launching via Office Macros and Scripts

By: August 31, 2015

We were recently asked by a customer how to block PowerShell from launching via macros embedded in MS Office files (xlx, doc, ppt, etc.). I did some research and found a handy tool for creating a bad Excel document that… Read More

What Dave Grohl and the Foo Fighters Taught Me about SOC Teams

By: August 27, 2015

I recently saw Dave Grohl talking about how great bands are born and how the state of reality TV has really messed things up. He said that kids today think you karaoke-karaoke-karaoke, then you stand in line at the pavilion… Read More